First published: Wed Mar 27 2024(Updated: )
A vulnerability was found in Tenda F1203 2.0.1.6. It has been declared as critical. Affected by this vulnerability is the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258145 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda FH1203 Firmware | =2.0.1.6 | |
Tenda FH1203 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2976 has been declared as critical due to its potential for stack-based buffer overflow.
To fix CVE-2024-2976, update the Tenda F1203 firmware to the latest version that addresses this vulnerability.
The affected software for CVE-2024-2976 is Tenda F1203 firmware version 2.0.1.6.
CVE-2024-2976 is a stack-based buffer overflow vulnerability.
The function exploited in CVE-2024-2976 is R7WebsSecurityHandler within the /goform/execCommand file.