First published: Wed Apr 17 2024(Updated: )
Tenda AC10 v4.0 V16.03.10.13 and V16.03.10.20 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC7, AC9, and AC10 Routers | >=V16.03.10.13<=V16.03.10.20 | |
All of | ||
Any of | ||
Tenda AC10V4 | =16.03.10.13 | |
Tenda AC10V4 | =16.03.10.20 | |
Tenda AC7, AC9, and AC10 Routers | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32317 is classified as a high severity vulnerability due to the potential for remote code execution caused by a stack overflow.
To fix CVE-2024-32317, upgrade the firmware of Tenda AC10 to version V16.03.10.21 or later.
CVE-2024-32317 affects Tenda AC10 devices running firmware versions V16.03.10.13 and V16.03.10.20.
CVE-2024-32317 is a stack overflow vulnerability that can be exploited via the adslPwd parameter in the formWanParameterSetting function.
Yes, CVE-2024-32317 can be exploited remotely, making it critical to address this vulnerability promptly.