First published: Thu Jun 25 2020(Updated: )
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Pa6 Firmware | =1.0.1.21 | |
Tendacn Pa6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19505 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2019-19505, users should update the Tenda PA6 firmware to the latest version provided by the manufacturer.
CVE-2019-19505 exploits a stack-based buffer overflow in the 'Wireless' section of the Tenda PA6 web-UI.
CVE-2019-19505 affects users of the Tenda PA6 Wi-Fi Powerline extender running firmware version 1.0.1.21.
Yes, an attacker exploiting CVE-2019-19505 can execute arbitrary code, potentially leading to data breaches.