Логотип exploitDog
bind:CVE-2024-4240
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4240

Количество 3

Количество 3

nvd логотип

CVE-2024-4240

почти 2 года назад

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-cwvf-gq9g-7g6c

почти 2 года назад

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-05116

почти 2 года назад

Уязвимость функции formQosManageDouble_user() микропрограммного обеспечения беспроводных точек доступа Tenda W9, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4240

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-cwvf-gq9g-7g6c

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-05116

Уязвимость функции formQosManageDouble_user() микропрограммного обеспечения беспроводных точек доступа Tenda W9, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу