8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Tenda AC9 POST Request WizardHandle decodePwd stack-based overflow
A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Performing a manipulation of the argument WANS results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.
References
-
VDB-356572 | Tenda AC9 POST Request WizardHandle decodePwd stack-based overflow vdb-entrytechnical-description
-
-
Submit #791829 | Tenda AC9 AC9 V1.0 V15.03.02.13 Buffer Overflow third-party-advisory
-
https://www.tenda.com.cn/ product
Affected products
- ==15.03.02.13
Matching in nixpkgs
pkgs.vimPlugins.nvim-treesitter-parsers.kconfig
Tree-sitter grammar for kconfig
-
nixos-unstable 0.0.0+rev=9ac99fe
- nixpkgs-unstable 0.0.0+rev=9ac99fe
- nixos-unstable-small 0.0.0+rev=9ac99fe