First published: Fri Feb 04 2022(Updated: )
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddDhcpBindRule. This vulnerability allows attackers to cause a Denial of Service (DoS) via the addDhcpRules parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn G1 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G1 | ||
Tendacn G3 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24172 is characterized as a Denial of Service (DoS) vulnerability.
To fix CVE-2022-24172, users should update their Tenda G1 or G3 routers to the latest firmware version or apply recommended patches.
CVE-2022-24172 affects Tenda routers G1 and G3 running firmware version 15.11.0.17(9502)_CN.
CVE-2022-24172 can lead to a Denial of Service (DoS), making the device unresponsive to legitimate requests.
Any attacker with access to the vulnerable Tenda devices can exploit CVE-2022-24172 by manipulating the addDhcpRules parameter.