First published: Sat Jul 27 2024(Updated: )
A vulnerability was found in Tenda O3 1.0.0.10(2478). It has been declared as critical. This vulnerability affects the function fromMacFilterSet of the file /goform/setMacFilter. The manipulation of the argument remark leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-272554 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda O3 | =1.0.0.10\(2478\) | |
Tenda O3v2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7151 has been declared as critical due to its potential for causing significant damage through stack-based buffer overflow.
To mitigate CVE-2024-7151, it is recommended to update the Tenda O3 firmware to the latest version provided by the vendor.
CVE-2024-7151 primarily affects the Tenda O3 devices running firmware version 1.0.0.10(2478).
CVE-2024-7151 is a stack-based buffer overflow vulnerability that can be exploited through specific argument manipulation.
Yes, exploiting CVE-2024-7151 can potentially allow an attacker to execute arbitrary code remotely on the affected device.