First published: Fri Oct 29 2021(Updated: )
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC9 V1.0 Firmware | <=15.03.06.42_multi | |
Tenda AC9 | =3.0 | |
Tenda AC9 V1.0 Firmware | <=15.03.05.19\(6318\) | |
Tenda AC9 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31624 is classified as a high severity buffer overflow vulnerability.
To fix CVE-2021-31624, update the Tenda AC9 firmware to a version higher than V15.03.06.42_multi.
CVE-2021-31624 affects Tenda AC9 V1.0 firmware versions up to V15.03.05.19(6318) and V3.0 firmware versions up to V15.03.06.42_multi.
Yes, CVE-2021-31624 allows attackers to execute arbitrary code through manipulation of the urls parameter.
CVE-2021-31624 can lead to unauthorized access and control over the affected Tenda AC9 devices.