CVE-2024-2899
Tenda AC7 WifiExtraSet fromSetWirelessRepeat stack-based overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as critical, has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257942 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad fue encontrada en Tenda AC7 15.03.06.44 y clasificada como crítica. La función fromSetWirelessRepeat del archivo /goform/WifiExtraSet es afectada por esta vulnerabilidad. La manipulación del argumento wpapsk_crypto provoca un desbordamiento de búfer en la región stack de la memoria. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-257942 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Eine kritische Schwachstelle wurde in Tenda AC7 15.03.06.44 entdeckt. Dies betrifft die Funktion fromSetWirelessRepeat der Datei /goform/WifiExtraSet. Durch die Manipulation des Arguments wpapsk_crypto mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-26 CVE Reserved
- 2024-03-26 CVE Published
- 2024-03-27 EPSS Updated
- 2024-06-14 First Exploit
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.257942 | Technical Description | |
https://vuldb.com/?submit.300362 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/Stuub/CVE-2024-28995 | 2024-07-01 | |
https://github.com/HussainFathy/CVE-2024-28999 | 2024-06-22 | |
https://github.com/0xc4t/CVE-2024-28995 | 2024-06-14 | |
https://github.com/Praison001/CVE-2024-28995-SolarWinds-Serv-U | 2024-06-26 | |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenda Search vendor "Tenda" | AC7 Search vendor "Tenda" for product "AC7" | 15.03.06.44 Search vendor "Tenda" for product "AC7" and version "15.03.06.44" | en |
Affected
|