Stack Buffer Overflow in Tenda-AX3 Router
CVE-2021-46393
9.8CRITICAL
Summary
The Tenda-AX3 router contains a stack buffer overflow vulnerability in the formSetPPTPServer function. An attacker can exploit this flaw by sending a specially crafted HTTP request to the /goform/SetPptpServerCfg endpoint, with the startIp parameter manipulated to overflow the buffer. This allows the potential for remote code execution, posing significant security risks for affected devices. Users are advised to apply updates or take preventive measures to secure their networks.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved