First published: Wed Dec 20 2023(Updated: )
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the bandwidth parameter in the wifiRadioSetIndoor function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Tenda i29 | =1.0.0.2 | |
Tenda i29 | =1.0.0.5 | |
Tenda I29 Firmware | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50988 has been classified as a high-severity vulnerability due to the potential for remote code execution from a buffer overflow.
CVE-2023-50988 allows an attacker to exploit the bandwidth parameter in the wifiRadioSetIndoor function, leading to a buffer overflow vulnerability.
To fix CVE-2023-50988, it is recommended to update the Tenda i29 firmware to the latest version provided by the manufacturer.
CVE-2023-50988 affects Tenda i29 devices with firmware versions 1.0.0.2 and 1.0.0.5.
Currently, the best workaround for CVE-2023-50988 is to implement network segmentation and limit Internet exposure until an official patch is available.