First published: Wed Apr 17 2024(Updated: )
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromVirtualSer function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W30e Firmware | ||
All of | ||
Tenda W30e Firmware | =1.0.1.25\(633\) | |
Tenda W30e Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32286 has a high severity rating due to its potential to allow remote code execution through a stack overflow.
To mitigate CVE-2024-32286, it is recommended to update the Tenda W30E firmware to the latest version supplied by the vendor.
The impact of CVE-2024-32286 includes the possibility of unauthorized access and control over the affected device due to the stack overflow vulnerability.
CVE-2024-32286 specifically affects Tenda W30E v1.0 devices running firmware version 1.0.1.25(633).
Yes, CVE-2024-32286 is exploitable remotely, allowing attackers to execute arbitrary code without local access.