First published: Mon Jan 15 2024(Updated: )
A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affected by this issue is the function formWifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250712. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda W9 Router | =1.0.0.7\(4456\) | |
Tenda W9 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0542 has been rated as critical due to its potential for remote exploitation.
CVE-2024-0542 exploits a stack-based buffer overflow through the manipulation of the argument index in the function formWifiMacFilterGet.
CVE-2024-0542 affects users of Tenda W9 firmware version 1.0.0.7(4456).
Yes, CVE-2024-0542 can be exploited remotely, making it a significant security risk.
If using the affected Tenda W9 device, it is advisable to update the firmware to a version that addresses CVE-2024-0542.