Tenda AC10U fromDhcpListClient stack-based overflow
CVE-2024-0928
Key Information:
Badges
Summary
A vulnerability present in the Tenda AC10U router, specifically in version 15.03.06.49_multi_TDE01, allows for a stack-based buffer overflow through the manipulation of the argument in the fromDhcpListClient function. This security flaw can be exploited remotely, enabling attackers to execute arbitrary code. The exploit method has been made public, raising significant concern among users regarding their device security. The vendor, Tenda, did not respond to early disclosure attempts regarding this issue, further emphasizing the importance of implementing protective measures.
Affected Version(s)
AC10U 15.03.06.49_multi_TDE01
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved