First published: Fri May 22 2020(Updated: )
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetNetControlList list parameter for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac6 Firmware | =v15.03.05.19_multi_td01 | |
Tendacn Ac6 | =1.0 | |
Tendacn Ac9 Firmware | =v15.03.05.19\(6318\) | |
Tendacn Ac9 | =1.0 | |
Tendacn Ac15 Firmware | =v15.03.05.19_multi_td01 | |
Tendacn Ac15 | =1.0 | |
Tendacn Ac18 Firmware | =v15.03.05.19\(6318\) | |
Tendacn Ac18 | ||
Tendacn Ac9 Firmware | =v15.03.06.42_multi | |
Tendacn Ac9 | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13394 is a buffer overflow vulnerability in the router's web server on Tenda AC6, AC9, AC15, and AC18 devices.
CVE-2020-13394 has a severity rating of 9.8 (Critical).
Tenda AC6, AC9, AC15, and AC18 devices are affected by CVE-2020-13394.
CVE-2020-13394 allows an attacker to exploit a buffer overflow vulnerability in the web server of Tenda routers, potentially leading to remote code execution or denial of service.
Currently, there is no official fix available for CVE-2020-13394. It is recommended to apply any patches or updates provided by the vendor when they become available, and to regularly check for firmware updates.