Описание
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. Affected by this vulnerability is the function formSetAPCfg of the file /goform/setWtpData. The manipulation of the argument radio_2g_1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. Affected by this vulnerability is the function formSetAPCfg of the file /goform/setWtpData. The manipulation of the argument radio_2g_1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-7586
- https://github.com/panda666-888/vuls/blob/main/tenda/ac500/formSetAPCfg.md
- https://github.com/panda666-888/vuls/blob/main/tenda/ac500/formSetAPCfg.md#poc
- https://vuldb.com/?ctiid.316285
- https://vuldb.com/?id.316285
- https://vuldb.com/?submit.615169
- https://www.tenda.com.cn
Связанные уязвимости
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. Affected by this vulnerability is the function formSetAPCfg of the file /goform/setWtpData. The manipulation of the argument radio_2g_1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Уязвимость функции formSetAPCfg() (/goform/setWtpData) микропрограммного обеспечения маршрутизаторов Tenda AC500, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании