First published: Thu Feb 22 2024(Updated: )
Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formSetDeviceName function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC9 V1.0 Firmware | =3.0 | |
Tenda AC9 V1.0 Firmware | =15.03.06.42_multi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25753 is classified as a critical vulnerability due to its potential for remote code execution.
CVE-2024-25753 allows a remote attacker to exploit a stack-based buffer overflow to execute arbitrary code on affected Tenda AC9 devices.
To address CVE-2024-25753, update your Tenda AC9 firmware to a version that corrects the buffer overflow vulnerability.
CVE-2024-25753 specifically affects Tenda AC9 version 3.0 running firmware version 15.03.06.42_multi.
Yes, CVE-2024-25753 can be exploited remotely without authentication, allowing attackers to execute arbitrary code.