CVE-2024-4118
Tenda W15E addIpMacBind formIPMacBindAdd stack-based overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. This affects the function formIPMacBindAdd of the file /goform/addIpMacBind. The manipulation of the argument IPMacBindRule leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261861 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Se encontró una vulnerabilidad en Tenda W15E 15.11.0.14. Ha sido clasificada como crítica. Esto afecta a la función formIPMacBindAdd del archivo /goform/addIpMacBind. La manipulación del argumento IPMacBindRule provoca un desbordamiento de búfer en la región stack de la memoria. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-261861. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Es wurde eine Schwachstelle in Tenda W15E 15.11.0.14 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion formIPMacBindAdd der Datei /goform/addIpMacBind. Mittels Manipulieren des Arguments IPMacBindRule mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-24 CVE Reserved
- 2024-04-24 CVE Published
- 2024-04-25 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.261861 | Technical Description | |
https://vuldb.com/?submit.317823 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenda Search vendor "Tenda" | W15E Search vendor "Tenda" for product "W15E" | 15.11.0.14 Search vendor "Tenda" for product "W15E" and version "15.11.0.14" | en |
Affected
|