Логотип exploitDog
bind:CVE-2025-4007
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-4007

Количество 3

Количество 3

nvd логотип

CVE-2025-4007

10 месяцев назад

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rxjp-vx38-m3vx

10 месяцев назад

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-05878

10 месяцев назад

Уязвимость функции cgidhcpsCfgSet() (Program:/bin/httpd) микропрограммного обеспечения маршрутизаторов Tenda W12 и i24, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-4007

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-rxjp-vx38-m3vx

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-05878

Уязвимость функции cgidhcpsCfgSet() (Program:/bin/httpd) микропрограммного обеспечения маршрутизаторов Tenda W12 и i24, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
10 месяцев назад

Уязвимостей на страницу