First published: Fri Aug 12 2022(Updated: )
A stack overflow vulnerability exists in /goform/setAutoPing in Tenda W6 V1.0.0.9(4122), which allows an attacker to construct ping1 parameters and ping2 parameters for a stack overflow attack. An attacker can use this vulnerability to execute arbitrary code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W6_S | =1.0.0.9\(4122\) | |
Tenda W6 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35559 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2022-35559, update the Tenda W6 firmware to the latest version that addresses this vulnerability.
CVE-2022-35559 is a stack overflow vulnerability that can be exploited through specific parameters in the /goform/setAutoPing function.
Devices running Tenda W6 firmware version 1.0.0.9(4122) are affected by CVE-2022-35559.
Yes, CVE-2022-35559 can lead to data breaches as it allows attackers to execute arbitrary code on the vulnerable devices.