First published: Mon Jan 15 2024(Updated: )
A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Affected by this vulnerability is the function formAddSysLogRule of the component httpd. The manipulation of the argument sysRulenEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250711. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda W9 Router | =1.0.0.7\(4456\) | |
Tenda W9 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0541 is declared as critical due to its potential impact.
To fix CVE-2024-0541, update the Tenda W9 firmware to the latest patched version.
CVE-2024-0541 can lead to a stack-based buffer overflow, potentially allowing remote code execution.
CVE-2024-0541 affects the httpd component in the function formAddSysLogRule.
CVE-2024-0541 is found on Tenda W9 firmware version 1.0.0.7(4456).