First published: Fri Dec 03 2021(Updated: )
A Stack-based Buffer Overflow vulnerability exists in the Tenda AC15 V15.03.05.18_multi device via the list parameter in a post request in goform/SetIpMacBind.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac15 Firmware | =15.03.05.18_multi | |
Tendacn Ac15 | ||
All of | ||
Tendacn Ac15 Firmware | =15.03.05.18_multi | |
Tendacn Ac15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44352 is critical with a CVSS score of 9.8.
The vulnerability in CVE-2021-44352 allows an attacker to overflow the stack and execute arbitrary code by sending a specially crafted POST request with a manipulated 'list' parameter in goform/SetIpMacBind.
The Tenda AC15 V15.03.05.18_multi device is affected by CVE-2021-44352.
Yes, the Tenda AC15 device with firmware version 15.03.05.18_multi is vulnerable to CVE-2021-44352.
At the time of writing, there is no official fix available for CVE-2021-44352. It is recommended to update to a patched firmware version when it becomes available.