First published: Fri Feb 04 2022(Updated: )
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formSetPortMapping. This vulnerability allows attackers to cause a Denial of Service (DoS) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn G1 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G1 | ||
Tendacn G3 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45996 is a vulnerability found in Tenda routers G1 and G3 v15.11.0.17(9502)_CN that allows attackers to cause a Denial of Service (DoS) through a stack overflow in the function formSetPortMapping.
CVE-2021-45996 has a severity level of high with a CVSS score of 7.5.
Attackers can exploit CVE-2021-45996 by sending malicious input to the vulnerable routers through the portMappingServer, portMappingProtocol, portMappingWan, portMappingInternal, and portMappingExte parameters, triggering a stack overflow and causing a Denial of Service (DoS) condition.
The Tenda router models G1 and G3 with firmware version 15.11.0.17(9502)_CN are affected by CVE-2021-45996.
As of now, there is no specific patch or fix available for CVE-2021-45996. It is recommended to update the firmware of the affected Tenda routers to the latest version provided by the vendor when it becomes available.