First published: Fri Apr 26 2024(Updated: )
A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Affected is the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AX1806 Firmware | ||
All of | ||
Tenda AX1806 Firmware | =1.0.0.1 | |
Tenda AX1806 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4237 is classified as a critical vulnerability.
CVE-2024-4237 affects the R7WebsSecurityHandler function in the Tenda AX1806, leading to a stack-based buffer overflow.
The vulnerable version is Tenda AX1806 with firmware version 1.0.0.1.
To mitigate CVE-2024-4237, it is recommended to update the firmware of the Tenda AX1806 to a patched version.
Currently, no specific workaround is available for CVE-2024-4237 other than applying the firmware update.