First published: Sun Sep 02 2018(Updated: )
An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server. While processing the ssid parameter for a POST request, the value is directly used in a sprintf call to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac18 Firmware | <=15.03.05.19 | |
Tendacn Ac18 | ||
Tendacn Ac15 Firmware | =15.03.05.19 | |
Tendacn Ac15 | ||
Tendacn Ac10 Firmware | =15.03.06.23 | |
Tendacn Ac10 | ||
Tendacn Ac9 Firmware | =15.03.05.19 | |
Tendacn Ac9 | ||
Tendacn Ac7 Firmware | =15.03.06.44 | |
Tendacn Ac7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-16333.
Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices are affected by this vulnerability.
The severity level of CVE-2018-16333 is high, with a severity value of 7.5.
CVE-2018-16333 is a buffer overflow vulnerability in the router's web server that occurs when processing the ssid parameter for a POST request.
It is recommended to update your Tenda router firmware to the latest version to mitigate the vulnerability.