Описание
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Ссылки
- Third Party Advisory
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Product
Уязвимые конфигурации
Одновременно
Одно из
Одновременно
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одновременно
Одновременно
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
EPSS
6.5 Medium
CVSS3
7.5 High
CVSS3
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Уязвимость функции websReadEvent микропрограммного обеспеченеия маршрутизаторов Tenda AC, позволяющая нарушителю выполнить произвольный код
EPSS
6.5 Medium
CVSS3
7.5 High
CVSS3
6.8 Medium
CVSS2