Tenda A15 Web-based Management Interface SetOnlineDevName stack-based overflow
CVE-2024-0533

7.2HIGH

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
15 January 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The Tenda A15 features a flaw in its web-based management interface that allows for a stack-based buffer overflow due to improper handling of inputs on the SetOnlineDevName function. Specifically, the devName argument can be manipulated, posing significant security risks, as this vulnerability can be exploited remotely. This issue has been publicly disclosed, and prompt action is essential to mitigate potential exploitation. Users are urged to check for firmware updates and apply them to secure their devices.

Affected Version(s)

A15 15.13.07.13

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

chenjun ma (VulDB User)
.