First published: Wed Feb 21 2024(Updated: )
A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC21 Firmware | =US_AC21V1.0re_V16.03.08.15_cn_TDC01 | |
All of | ||
Tenda AC21 Firmware | =16.03.08.15 | |
Tenda AC21 Firmware | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24333 is rated as high due to its potential to allow remote code execution.
To fix CVE-2023-24333, update the Tenda AC21 firmware to the latest version recommended by the vendor.
CVE-2023-24333 affects Tenda AC21 routers running the specific firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01.
CVE-2023-24333 allows attackers to execute arbitrary commands on the Tenda AC21 router through a crafted POST request.
Currently, the best course of action for CVE-2023-24333 is to upgrade the firmware, as there are no known workarounds.