Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jx4p-33jj-p9hw

Опубликовано: 18 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 28%
0.00096
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 месяца назад

A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
около 1 месяца назад

Уязвимость функции fromPptpUserAdd() микропрограммного обеспечения маршрутизаторов Tenda FH451, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 28%
0.00096
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119