First published: Thu Apr 25 2024(Updated: )
A vulnerability, which was classified as critical, was found in Tenda G3 15.11.0.17(9502). Affected is the function modifyDhcpRule of the file /goform/modifyDhcpRule. The manipulation of the argument bindDhcpIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261984. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda G3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4165 is classified as a critical vulnerability.
CVE-2024-4165 causes a stack-based buffer overflow due to manipulation of the bindDhcpIndex argument.
Tenda G3 with firmware version 15.11.0.17(9502) is affected by CVE-2024-4165.
To fix CVE-2024-4165, update your Tenda G3 device to the latest firmware that addresses this vulnerability.
To mitigate CVE-2024-4165, ensure that your device firmware is up to date and limit external access to your device.