First published: Tue Apr 23 2024(Updated: )
A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC8 firmware | ||
All of | ||
Tenda AC8 Firmware | =16.03.34.09 | |
Tenda AC8 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-4066 is classified as critical due to a stack-based buffer overflow vulnerability.
To fix CVE-2024-4066, it is recommended to update the Tenda AC8 firmware to the latest version that addresses this vulnerability.
The affected version for CVE-2024-4066 is Tenda AC8 firmware version 16.03.34.09.
CVE-2024-4066 impacts the function fromAdvSetMacMtuWan in the Tenda AC8 device's firmware.
CVE-2024-4066 is a stack-based buffer overflow vulnerability that can allow remote code execution.