First published: Fri May 22 2020(Updated: )
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/saveParentControlInfo deviceId and time parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac6 Firmware | =v15.03.05.19_multi_td01 | |
Tendacn Ac6 | =1.0 | |
Tendacn Ac9 Firmware | =v15.03.05.19\(6318\) | |
Tendacn Ac9 | =1.0 | |
Tendacn Ac15 Firmware | =v15.03.05.19_multi_td01 | |
Tendacn Ac15 | =1.0 | |
Tendacn Ac18 Firmware | =v15.03.05.19\(6318\) | |
Tendacn Ac18 | ||
Tendacn Ac9 Firmware | =v15.03.06.42_multi | |
Tendacn Ac9 | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13393 is a buffer overflow vulnerability in the web server of Tenda AC6, AC9, AC15, and AC18 routers.
Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices are affected.
CVE-2020-13393 has a severity score of 9.8, which is considered critical.
To fix CVE-2020-13393, it is recommended to update to the latest firmware version provided by Tenda.
More information about CVE-2020-13393 can be found on the following links: [link1](https://joel-malwarebenchmark.github.io), [link2](https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/)