First published: Thu Apr 25 2024(Updated: )
A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affected is the function fromWizardHandle of the file /goform/WizardHandle. The manipulation of the argument PPW leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-261990 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W30e Firmware | >=1.0<=1.0.1.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4171 is classified as a critical vulnerability.
To fix CVE-2024-4171, update the Tenda W30E firmware to the latest version available.
CVE-2024-4171 can be exploited through a remote stack-based buffer overflow attack.
CVE-2024-4171 affects Tenda W30E devices running firmware versions 1.0 to 1.0.1.25.
CVE-2024-4171 allows attackers to manipulate arguments, potentially leading to unauthorized access or control of affected devices.