First published: Tue May 14 2024(Updated: )
Tenda O3V2 with firmware versions V1.0.0.10 and V1.0.0.12 was discovered to contain a Blind Command Injection via dest parameter in /goform/getTraceroute. This vulnerability allows attackers to execute arbitrary commands with root privileges. Authentication is required to exploit this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda O3v2 Firmware | >=V1.0.0.10<=V1.0.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34338 is classified as a high severity vulnerability due to its potential for remote command execution with root privileges.
To fix CVE-2024-34338, update the Tenda O3V2 firmware to the latest version that addresses this vulnerability.
Tenda O3V2 firmware versions V1.0.0.10 and V1.0.0.12 are affected by CVE-2024-34338.
No, CVE-2024-34338 requires authentication in order to exploit the blind command injection vulnerability.
CVE-2024-34338 can allow an attacker to execute arbitrary commands on the Tenda O3V2 device, potentially compromising its security.