First published: Fri Jul 14 2023(Updated: )
Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fromDhcpListClient.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda F1202 Firmware | =1.2.0.20\(408\) | |
Tenda F1202 | ||
Tenda Fh1202 Firmware | =1.2.0.19_en | |
Tenda Fh1202 | ||
Tenda F1202 Firmware | =1.0br | |
Tenda Ac10 Firmware | =1.0 | |
Tenda AC10 | ||
Tenda Ac1206 Firmware | =1.0 | |
Tenda AC1206 | ||
Tenda Ac7 Firmware | =1.0 | |
Tenda AC7 | ||
Tenda Ac5 Firmware | =1.0 | |
Tenda AC5 | ||
Tenda Ac9 Firmware | =3.0 | |
Tenda AC9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-37717 is critical with a severity value of 9.
Tenda F1202 V1.0BR_V1.2.0.20(408), Tenda FH1202_V1.2.0.19_EN, Tenda AC10 V1.0, Tenda AC1206 V1.0, Tenda AC7 V1.0, Tenda AC5 V1.0, and Tenda AC9 V3.0 are affected by CVE-2023-37717.
To fix CVE-2023-37717, update the affected Tenda devices to the latest firmware version provided by the vendor.
The CWE ID for CVE-2023-37717 is CWE-787.
More information about CVE-2023-37717 can be found at the following reference: [link](https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md).