CVE-2024-0535
Tenda PA6 httpd portmap cgiPortMapAdd stack-based overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability classified as critical was found in Tenda PA6 1.0.1.21. Affected by this vulnerability is the function cgiPortMapAdd of the file /portmap of the component httpd. The manipulation of the argument groupName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250705 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad fue encontrada en Tenda PA6 1.0.1.21 y clasificada como crítica. La función cgiPortMapAdd del archivo /portmap del componente httpd es afectada por esta vulnerabilidad. La manipulación del argumento groupName provoca un desbordamiento de búfer en la región stack de la memoria. El ataque se puede lanzar de forma remota. La explotación ha sido divulgada al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-250705. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera
In Tenda PA6 1.0.1.21 wurde eine kritische Schwachstelle entdeckt. Es geht um die Funktion cgiPortMapAdd der Datei /portmap der Komponente httpd. Durch Manipulation des Arguments groupName mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-01-14 CVE Reserved
- 2024-01-15 CVE Published
- 2024-07-22 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.250705 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/jylsec/vuldb/blob/main/Tenda/PA6/2/README.md | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tendacn Search vendor "Tendacn" | Pa6 Firmware Search vendor "Tendacn" for product "Pa6 Firmware" | 1.0.1.21 Search vendor "Tendacn" for product "Pa6 Firmware" and version "1.0.1.21" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | Pa6 Search vendor "Tendacn" for product "Pa6" | - | - |
Safe
|