Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gx3m-44w2-wmgh

Опубликовано: 08 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 27%
0.00093
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
11 дней назад

A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
11 дней назад

Уязвимость компонента HTTP POST Request Handler функции formSetSafeWanWebMan() микропрограммного обеспечения маршрутизатора Tenda AC9, позволяющая нарушителю оказывать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 27%
0.00093
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-787