First published: Tue Nov 19 2024(Updated: )
Tenda W9 v1.0.0.7(4456) was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W9 Firmware | ||
All of | ||
Tenda W9 Router | =1.0.0.7\(4456\) | |
Tenda W9 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52788 has a high severity rating due to the presence of a hardcoded password vulnerability that allows unauthorized access as root.
To fix CVE-2024-52788, update the Tenda W9 firmware to the latest version that addresses the hardcoded password vulnerability.
CVE-2024-52788 allows attackers to gain root access to your Tenda W9 device, compromising its security and potentially leading to further exploits.
If you are using Tenda W9 with firmware version v1.0.0.7(4456), your device is affected by CVE-2024-52788.
The risks associated with CVE-2024-52788 include unauthorized access, data breaches, and potential control over the device's functions by malicious actors.