First published: Fri Nov 01 2024(Updated: )
A vulnerability has been found in Tenda AC15 15.03.05.19 and classified as critical. This vulnerability affects the function SetDlnaCfg of the file /goform/SetDlnaCfg. The manipulation of the argument scanList leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda AC15 Firmware | =15.03.05.19 | |
Tenda AC15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10661 is classified as critical due to its potential for remote exploitation and stack-based buffer overflow.
To mitigate CVE-2024-10661, upgrade to a patched version of the Tenda AC15 firmware that addresses this specific vulnerability.
CVE-2024-10661 allows an attacker to execute a remote attack leading to a buffer overflow due to manipulation of the scanList argument.
The vulnerability CVE-2024-10661 affects the Tenda AC15 router running firmware version 15.03.05.19.
Yes, CVE-2024-10661 can be exploited remotely without authentication, making it particularly dangerous.