Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w64q-pg96-cpvq

Опубликовано: 27 мая 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 27%
0.00097
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-121
CWE-787

Связанные уязвимости

CVSS3: 6.3
nvd
больше 2 лет назад

A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
fstec
больше 2 лет назад

Уязвимость функции fromDhcpListClient микропрограммного обеспечения маршрутизаторов Tenda AC6, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

EPSS

Процентиль: 27%
0.00097
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-121
CWE-787