Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pj65-96p4-vhw4

Опубликовано: 28 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 40%
0.00185
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-121
CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость функций ate_Tenda_mfg_check_usb() и ate_Tenda_mfg_check_usb3() (/goform/ate) микропрограммного обеспечения маршрутизаторов Tenda AC1206, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 40%
0.00185
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-121
CWE-787