First published: Fri Mar 22 2024(Updated: )
A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Tenda A15 | =15.03.05.18 | |
Tenda A15 | =15.03.05.20_multi | |
Tenda AC15 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2809 is classified as a critical vulnerability.
To fix CVE-2024-2809, update your Tenda AC15 router firmware to a version that addresses this vulnerability.
CVE-2024-2809 is a stack-based buffer overflow vulnerability.
CVE-2024-2809 affects the Tenda AC15 firmware versions 15.03.05.18 and 15.03.05.20_multi.
The exploitation of CVE-2024-2809 can lead to potential unauthorized access and control over the affected device.