First published: Mon Aug 07 2023(Updated: )
Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and FH1203 V2.0.1.6 were discovered to contain a stack overflow via the list parameter in the setaccount function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac10 Firmware | =15.03.06.23 | |
Tenda AC10 | =1.0 | |
Tenda Ac1206 Firmware | =15.03.06.23 | |
Tenda AC1206 | ||
Tenda Ac8 Firmware | =16.03.34.06 | |
Tenda AC8 | =4.0 | |
Tenda Ac6 Firmware | =15.03.06.23 | |
Tenda AC6 | =2.0 | |
Tenda Ac7 Firmware | =15.03.06.44 | |
Tenda AC7 | =1.0 | |
Tenda F1203 Firmware | =2.0.1.6 | |
Tenda F1203 | ||
Tenda Ac5 Firmware | =15.03.06.28 | |
Tenda AC5 | =1.0 | |
Tenda Ac10 Firmware | =16.03.10.13 | |
Tenda AC10 | =4.0 | |
Tenda Fh1203 Firmware | =2.0.1.6 | |
Tenda FH1203 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38931.
The severity of CVE-2023-38931 is critical with a severity value of 9.8.
Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13, and FH1203 V2.0.1.6 are affected by CVE-2023-38931.
CVE-2023-38931 allows attackers to perform a stack overflow via the list parameter in the setaccount function.
At the moment, there is no known fix for CVE-2023-38931. It is recommended to check with Tenda for any available patches or updates.