First published: Wed Apr 17 2024(Updated: )
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critical. This affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261141 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC500 Firmware | ||
All of | ||
Tenda AC500 | =2.0.1.9\(1307\) | |
Tenda AC500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3905 has been classified as critical due to the potential for a stack-based buffer overflow.
To fix CVE-2024-3905, update the firmware of Tenda AC500 to the latest version that addresses this vulnerability.
CVE-2024-3905 affects Tenda AC500 running firmware version 2.0.1.9(1307).
CVE-2024-3905 is a stack-based buffer overflow vulnerability.
Yes, CVE-2024-3905 could potentially be exploited remotely if the affected system is accessible.