First published: Thu Aug 24 2023(Updated: )
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac8v4 Firmware | =16.03.34.06 | |
Tenda AC8V4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn is CVE-2023-40896.
The severity of CVE-2023-40896 is critical with a severity value of 9.8.
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn can be exploited through a stack overflow via the parameter list and bindnum at /goform/SetIpMacBind.
No, Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn is not the only affected software. Tenda Ac8v4 Firmware version 16.03.34.06 is also affected.
To fix the vulnerability in Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn, it is recommended to update to a patched version of the firmware.