Tenda W9 httpd formOfflineSet stack-based overflow
CVE-2024-0540

9.8CRITICAL

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
15 January 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability has been identified in the Tenda W9, specifically within the function formOfflineSet of the httpd component. This flaw arises from improper handling of the ssidIndex argument, which can lead to a stack-based buffer overflow. Given the nature of the vulnerability, it can be exploited remotely, potentially allowing attackers to execute arbitrary code or cause denial of service. As the exploit is publicly disclosed, it is crucial for users of the affected Tenda W9 version to take immediate action to mitigate risks associated with this security issue.

Affected Version(s)

W9 1.0.0.7(4456)

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

jylsec (VulDB User)
.