First published: Thu Aug 24 2023(Updated: )
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac8v4 Firmware | =16.03.34.06 | |
Tenda AC8V4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40892 is critical with a CVSS score of 9.8.
CVE-2023-40892 affects Tenda AC8 v4 firmware version 16.03.34.06 by causing a stack overflow through the parameter schedStartTime and schedEndTime at /goform/openSchedWifi.
No, Tenda AC8V4 is not vulnerable to CVE-2023-40892.
To fix the stack overflow vulnerability in Tenda AC8 v4 firmware version 16.03.34.06, it is recommended to update to a patched version provided by Tenda.
The Common Weakness Enumeration (CWE) ID associated with CVE-2023-40892 is CWE-787.