First published: Thu Apr 25 2019(Updated: )
An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the page parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, a causing buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac7 Firmware | <=15.03.06.44_cn | |
Tenda AC7 | ||
Tenda Ac9 Firmware | <=15.03.05.19\(6318\)_cn | |
Tenda AC9 | ||
Tenda Ac10 Firmware | <=15.03.06.23_cn | |
Tenda AC10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-14557.
The severity of CVE-2018-14557 is high with a CVSS score of 7.5.
Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10) are affected by CVE-2018-14557.
The vulnerability in Tenda devices is a buffer overflow vulnerability in the router's web server (httpd).
Yes, make sure to update the firmware on your Tenda device to a version higher than V15.03.06.44_CN(AC7) for AC7, V15.03.05.19(6318)_CN(AC9) for AC9, and V15.03.06.23_CN(AC10) for AC10.