First published: Fri Jul 14 2023(Updated: )
Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fromDhcpListClient.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda F1202 firmware | =1.2.0.20\(408\) | |
Tenda F1202 firmware | ||
Tenda FH1202 firmware | =1.2.0.19_en | |
Tenda FH1202 firmware | ||
Tenda F1202 firmware | =1.0br | |
Tenda AC10V4 | =1.0 | |
Tenda AC10V4 | ||
Tenda AC1206 firmware | =1.0 | |
Tenda AC1206 firmware | ||
Tenda AC7 Firmware | =1.0 | |
Tenda AC7V1.0 | ||
Tenda AC5 firmware | =1.0 | |
Tenda AC5 | ||
Tenda AC9 V1.0 Firmware | =3.0 | |
Tenda AC9 V1.0 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-37717 is critical with a severity value of 9.
Tenda F1202 V1.0BR_V1.2.0.20(408), Tenda FH1202_V1.2.0.19_EN, Tenda AC10 V1.0, Tenda AC1206 V1.0, Tenda AC7 V1.0, Tenda AC5 V1.0, and Tenda AC9 V3.0 are affected by CVE-2023-37717.
To fix CVE-2023-37717, update the affected Tenda devices to the latest firmware version provided by the vendor.
The CWE ID for CVE-2023-37717 is CWE-787.
More information about CVE-2023-37717 can be found at the following reference: [link](https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md).