First published: Thu Apr 25 2019(Updated: )
An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the list parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac7 Firmware | <=15.03.06.44_cn | |
Tenda AC7 | ||
Tenda Ac9 Firmware | <=15.03.05.19\(6318\)_cn | |
Tenda AC9 | ||
Tenda Ac10 Firmware | <=15.03.06.23_cn | |
Tenda AC10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-14559.
The Tenda AC7, AC9, and AC10 devices are affected by this vulnerability.
The severity of CVE-2018-14559 is rated as high.
The CWE ID for this vulnerability is CWE-119.
Yes, updating the firmware to the latest version provided by Tenda will fix this vulnerability.