CVE-2024-6964
Tenda O3 fromDhcpSetSer stack-based overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as critical, was found in Tenda O3 1.0.0.10. Affected is the function fromDhcpSetSer. The manipulation of the argument dhcpEn/startIP/endIP/preDNS/altDNS/mask/gateway leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272118 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad fue encontrada en Tenda O3 1.0.0.10 y clasificada como crítica. La función fromDhcpSetSer es afectada por la vulnerabilidad. La manipulación del argumento dhcpEn/startIP/endIP/preDNS/altDNS/mask/gateway conduce a un desbordamiento de búfer en la región stack de la memoria. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-272118 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó al proveedor tempranamente sobre esta divulgación, pero no respondió de ninguna manera.
Es wurde eine Schwachstelle in Tenda O3 1.0.0.10 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion fromDhcpSetSer. Dank der Manipulation des Arguments dhcpEn/startIP/endIP/preDNS/altDNS/mask/gateway mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-07-21 CVE Reserved
- 2024-07-22 CVE Published
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.272118 | Technical Description | |
https://vuldb.com/?submit.374585 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/fromDhcpSetSer.md | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenda Search vendor "Tenda" | O3 Firmware1.0.0.10\(2478\) Search vendor "Tenda" for product "O3 Firmware1.0.0.10\(2478\)" | * | - |
Affected
| in | Tenda Search vendor "Tenda" | O3 Search vendor "Tenda" for product "O3" | 2.0 Search vendor "Tenda" for product "O3" and version "2.0" | - |
Safe
|