First published: Wed Apr 24 2024(Updated: )
A vulnerability classified as critical was found in Tenda TX9 22.03.02.10. This vulnerability affects the function sub_42D4DC of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda TX9 | ||
All of | ||
Tenda Tx9 Pro Firmware | =22.03.02.10 | |
Tenda TX9 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4113 is classified as a critical vulnerability.
CVE-2024-4113 affects the function sub_42D4DC in Tenda TX9 22.03.02.10, leading to a stack-based buffer overflow.
Yes, CVE-2024-4113 can be initiated remotely.
CVE-2024-4113 may allow an attacker to execute arbitrary code due to the stack-based buffer overflow.
To fix CVE-2024-4113, update the Tenda TX9 firmware to a version that addresses this vulnerability.