First published: Tue Mar 26 2024(Updated: )
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. This vulnerability affects the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC7V1.0 | ||
All of | ||
Tenda AC7 Firmware | =15.03.06.44 | |
Tenda AC7V1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2895 is declared as critical due to its potential for remote exploitation leading to a stack-based buffer overflow.
To fix CVE-2024-2895, update the Tenda AC7 firmware to the latest version, ensuring the vulnerability is patched.
CVE-2024-2895 is a stack-based buffer overflow vulnerability affecting the Tenda AC7 router.
CVE-2024-2895 affects the formWifiWpsOOB function within the /goform/WifiWpsOOB file.
Yes, CVE-2024-2895 can be exploited remotely, making it critical for users to address the vulnerability promptly.