CVE-2024-4171
Tenda W30E WizardHandle fromWizardHandle stack-based overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affected is the function fromWizardHandle of the file /goform/WizardHandle. The manipulation of the argument PPW leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-261990 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad ha sido encontrada en Tenda W30E 1.0/1.0.1.25 y clasificada como crítica. La función fromWizardHandle del fichero /goform/WizardHandle es afectada por la vulnerabilidad. La manipulación del argumento PPW conduce a un desbordamiento de búfer en la región stack de la memoria. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-261990 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Es wurde eine kritische Schwachstelle in Tenda W30E 1.0/1.0.1.25 entdeckt. Es betrifft die Funktion fromWizardHandle der Datei /goform/WizardHandle. Durch die Manipulation des Arguments PPW mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-25 CVE Reserved
- 2024-04-25 CVE Published
- 2024-04-26 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.261990 | Technical Description | |
https://vuldb.com/?submit.318995 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenda Search vendor "Tenda" | W30E Search vendor "Tenda" for product "W30E" | 1.0 Search vendor "Tenda" for product "W30E" and version "1.0" | en |
Affected
| ||||||
Tenda Search vendor "Tenda" | W30E Search vendor "Tenda" for product "W30E" | 1.0.1.25 Search vendor "Tenda" for product "W30E" and version "1.0.1.25" | en |
Affected
|