Описание
A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-11122
- https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/AC18/WizardHandle.md
- https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/AC18/WizardHandle2.md
- https://vuldb.com/?ctiid.326203
- https://vuldb.com/?id.326203
- https://vuldb.com/?submit.664194
- https://vuldb.com/?submit.664195
- https://www.tenda.com.cn
Связанные уязвимости
A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Уязвимость функции SetValue() (/goform/WizardHandle) микропрограммного обеспечения маршрутизаторов Tenda AC18, позволяющая нарушителю вызвать отказ в обслуживании