First published: Fri Feb 04 2022(Updated: )
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function guestWifiRuleRefresh. This vulnerability allows attackers to cause a Denial of Service (DoS) via the qosGuestUpstream and qosGuestDownstream parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda G1 | =15.11.0.17\(9502\)_cn | |
Tendacn G1 Firmware | ||
Tendacn G3 Firmware | =15.11.0.17\(9502\)_cn | |
Tenda G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45989 is classified as a moderate severity vulnerability due to its potential to cause a Denial of Service.
To fix CVE-2021-45989, update the Tenda G1 and G3 routers to the latest firmware version that addresses this vulnerability.
The Tenda G1 and G3 routers running firmware version 15.11.0.17(9502)_CN are affected by CVE-2021-45989.
CVE-2021-45989 can lead to a Denial of Service by exploiting a stack overflow in the router's handling of certain parameters.
Yes, CVE-2021-45989 is considered easily exploitable, allowing attackers to disrupt network service with minimal effort.