Логотип exploitDog
bind:CVE-2025-10432
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10432

Количество 3

Количество 3

nvd логотип

CVE-2025-10432

5 месяцев назад

A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qj3f-pj4g-wfgq

5 месяцев назад

A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-11227

5 месяцев назад

Уязвимость функции check_param_changed() микропрограммного обеспечения маршрутизаторов Tenda AC1206, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-10432

A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVSS3: 9.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-qj3f-pj4g-wfgq

A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVSS3: 9.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11227

Уязвимость функции check_param_changed() микропрограммного обеспечения маршрутизаторов Tenda AC1206, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу