First published: Wed Aug 30 2023(Updated: )
Tenda AC7 V1.0 V15.03.06.44 and Tenda AC9 V3.0 V15.03.06.42_multi were discovered to contain a stack overflow via parameter ssid at url /goform/fast_setting_wifi_set.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac9 Firmware | =5.03.06.42_multi | |
Tenda AC9 | =3.0 | |
Tenda Ac7 Firmware | =15.03.06.44 | |
Tenda AC7 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41552 is critical with a rating of 9.8.
Tenda AC7 V1.0 V15.03.06.44 and Tenda AC9 V3.0 V15.03.06.42_multi are affected by CVE-2023-41552.
The vulnerability in Tenda AC7 and AC9 is caused by a stack overflow in the parameter ssid at the URL /goform/fast_setting_wifi_set.
There is currently no fix available for CVE-2023-41552. It is recommended to follow any updates or patches provided by the vendor.
No, Tenda AC9 version 3.0 is not vulnerable to CVE-2023-41552.