Логотип exploitDog
bind:CVE-2025-5619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-5619

Количество 3

Количество 3

nvd логотип

CVE-2025-5619

8 месяцев назад

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-cp34-r5vc-7cw6

8 месяцев назад

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-10210

8 месяцев назад

Уязвимость функции formaddUserName() (/goform/addUserName) микропрограммного обеспечения маршрутизаторов Tenda CH22, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-5619

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
github логотип
GHSA-cp34-r5vc-7cw6

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-10210

Уязвимость функции formaddUserName() (/goform/addUserName) микропрограммного обеспечения маршрутизаторов Tenda CH22, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.8
0%
Низкий
8 месяцев назад

Уязвимостей на страницу