First published: Fri Apr 07 2023(Updated: )
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda AC5 Firmware | =15.03.06.28 | |
Tenda AC5 Firmware | =1.0 | |
Tenda AC5 Firmware | =15.03.06.28 | |
Tenda AC5 Firmware | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25215 is a vulnerability found in Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 firmware that allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
CVE-2023-25215 has a severity rating of critical, with a CVSS score of 9.8.
The affected software for CVE-2023-25215 is Tenda AC5 firmware version 15.03.06.28.
CVE-2023-25215 can be exploited by attackers via a crafted payload to cause a Denial of Service (DoS) or execute arbitrary code.
No, Tenda AC5 version 1.0 is not vulnerable to CVE-2023-25215.