Логотип exploitDog
bind:CVE-2024-2900
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-2900

Количество 3

Количество 3

nvd логотип

CVE-2024-2900

почти 2 года назад

A vulnerability, which was classified as critical, was found in Tenda AC7 15.03.06.44. This affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257943. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-jh55-qq58-48ph

почти 2 года назад

A vulnerability, which was classified as critical, was found in Tenda AC7 15.03.06.44. This affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257943. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-02474

почти 2 года назад

Уязвимость функции saveParentControlInfo (/goform/saveParentControlInfo) микропрограммного обеспечения маршрутизаторов Tenda AC7, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-2900

A vulnerability, which was classified as critical, was found in Tenda AC7 15.03.06.44. This affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257943. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
1%
Низкий
почти 2 года назад
github логотип
GHSA-jh55-qq58-48ph

A vulnerability, which was classified as critical, was found in Tenda AC7 15.03.06.44. This affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257943. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02474

Уязвимость функции saveParentControlInfo (/goform/saveParentControlInfo) микропрограммного обеспечения маршрутизаторов Tenda AC7, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.8
1%
Низкий
почти 2 года назад

Уязвимостей на страницу