First published: Mon Nov 27 2023(Updated: )
Buffer Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the wpapsk_crypto parameter in the function fromSetWirelessRepeat.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda Ax1803 Firmware | =1.0.0.1 | |
Tenda AX1803 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-49043.
The severity of CVE-2023-49043 is critical with a CVSS score of 9.8.
The vulnerability in Tenda AX1803 v.1.0.0.1 occurs due to a buffer overflow in the wpapsk_crypto parameter in the function fromSetWirelessRepeat.
The affected software version is Tenda AX1803 v.1.0.0.1 firmware.
Yes, Tenda AX1803 v.1.0.0.1 firmware is vulnerable to this buffer overflow vulnerability.
A remote attacker can exploit this vulnerability by executing arbitrary code through the wpapsk_crypto parameter in the function fromSetWirelessRepeat.
To fix the vulnerability in Tenda AX1803 v.1.0.0.1, it is recommended to update to the latest firmware version provided by Tenda.
You can find more information about this vulnerability at the following reference link: [https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md](https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md)