CVE-2020-13389
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/openSchedWifi schedStartTime and schedEndTime parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
Se detectó un problema en dispositivos Tenda AC6 versiones V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, y AC18 V15.03.05.19 (6318_)_CN. Se presenta una vulnerabilidad de desbordamiento de búfer en el servidor web del enrutador: httpd. Mientras se procesan los parámetros schedStartTime y schedEndTime de /goform/openSchedWifi para una petición POST, un valor es usado directamente en una strcpy para una variable local colocada en la pila, que sobrescribe la dirección de retorno de una función. Un atacante puede construir una carga útil para llevar a cabo ataques de ejecución de código arbitrario.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-22 CVE Reserved
- 2020-05-22 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-08-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13389-Tenda-vulnerability | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://joel-malwarebenchmark.github.io | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tendacn Search vendor "Tendacn" | Ac6 Firmware Search vendor "Tendacn" for product "Ac6 Firmware" | v15.03.05.19_multi_td01 Search vendor "Tendacn" for product "Ac6 Firmware" and version "v15.03.05.19_multi_td01" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Ac6 Search vendor "Tendacn" for product "Ac6" | 1.0 Search vendor "Tendacn" for product "Ac6" and version "1.0" | - |
Safe
|
Tendacn Search vendor "Tendacn" | Ac9 Firmware Search vendor "Tendacn" for product "Ac9 Firmware" | v15.03.05.19\(6318\) Search vendor "Tendacn" for product "Ac9 Firmware" and version "v15.03.05.19\(6318\)" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Ac9 Search vendor "Tendacn" for product "Ac9" | 1.0 Search vendor "Tendacn" for product "Ac9" and version "1.0" | - |
Safe
|
Tendacn Search vendor "Tendacn" | Ac15 Firmware Search vendor "Tendacn" for product "Ac15 Firmware" | v15.03.05.19_multi_td01 Search vendor "Tendacn" for product "Ac15 Firmware" and version "v15.03.05.19_multi_td01" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Ac15 Search vendor "Tendacn" for product "Ac15" | 1.0 Search vendor "Tendacn" for product "Ac15" and version "1.0" | - |
Safe
|
Tendacn Search vendor "Tendacn" | Ac18 Firmware Search vendor "Tendacn" for product "Ac18 Firmware" | v15.03.05.19\(6318\) Search vendor "Tendacn" for product "Ac18 Firmware" and version "v15.03.05.19\(6318\)" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Ac18 Search vendor "Tendacn" for product "Ac18" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | Ac9 Firmware Search vendor "Tendacn" for product "Ac9 Firmware" | v15.03.06.42_multi Search vendor "Tendacn" for product "Ac9 Firmware" and version "v15.03.06.42_multi" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Ac9 Search vendor "Tendacn" for product "Ac9" | 3.0 Search vendor "Tendacn" for product "Ac9" and version "3.0" | - |
Safe
|