CVE-2019-19505
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
El extensor Tenda PA6 Wi-Fi Powerline versión 1.0.1.21, es vulnerable a un desbordamiento del búfer en la región stack de la memoria, causado por una comprobación incorrecta de límites mediante la sección "Wireless" ??en la Interfaz de Usuario Web. Mediante el envío de un nombre de host especialmente diseñado, un atacante remoto podría desbordar un búfer y ejecutar código arbitrario en el sistema o causar que la aplicación se bloquee
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-02 CVE Reserved
- 2020-06-25 CVE Published
- 2024-08-04 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://securityintelligence.com/posts/vulnerable-powerline-extenders-underline-lax-iot-security | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tendacn Search vendor "Tendacn" | Pa6 Firmware Search vendor "Tendacn" for product "Pa6 Firmware" | 1.0.1.21 Search vendor "Tendacn" for product "Pa6 Firmware" and version "1.0.1.21" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Pa6 Search vendor "Tendacn" for product "Pa6" | - | - |
Safe
|