Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cp34-r5vc-7cw6

Опубликовано: 05 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 58%
0.00373
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
8 месяцев назад

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
8 месяцев назад

Уязвимость функции formaddUserName() (/goform/addUserName) микропрограммного обеспечения маршрутизаторов Tenda CH22, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 58%
0.00373
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787