First published: Wed Apr 24 2024(Updated: )
A vulnerability was found in Tenda TX9 22.03.02.10. It has been rated as critical. Affected by this issue is the function sub_42BD7C of the file /goform/SetLEDCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda TX9 | ||
All of | ||
Tenda Tx9 Pro Firmware | =22.03.02.10 | |
Tenda TX9 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4111 has been rated as critical due to the stack-based buffer overflow vulnerability.
To fix CVE-2024-4111, update the Tenda TX9 firmware to the latest version released by the vendor.
CVE-2024-4111 is a stack-based buffer overflow vulnerability.
Yes, CVE-2024-4111 can be exploited remotely, allowing attackers to manipulate specific arguments.
CVE-2024-4111 affects Tenda TX9 firmware version 22.03.02.10.