First published: Wed Aug 07 2024(Updated: )
A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as critical. Affected by this vulnerability is the function formApPortalWebAuth of the file /goform/apPortalAuth. The manipulation of the argument webUserName/webUserPassword leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda i22 | =1.0.0.3\(4687\) | |
Tenda I22 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7585 is classified as critical due to its potential to exploit a buffer overflow.
To fix CVE-2024-7585, update Tenda i22 firmware to a version that addresses this vulnerability.
CVE-2024-7585 affects Tenda i22 firmware version 1.0.0.3(4687).
CVE-2024-7585 allows an attacker to exploit a buffer overflow vulnerability through manipulation of the webUserName or webUserPassword arguments.
The vulnerability in CVE-2024-7585 is found in the formApPortalWebAuth function located in the /goform/apPortalAuth file.