Tenda AC10U fromDhcpListClient stack-based overflow
CVE-2024-0928

9.8CRITICAL

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
26 January 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability present in the Tenda AC10U router, specifically in version 15.03.06.49_multi_TDE01, allows for a stack-based buffer overflow through the manipulation of the argument in the fromDhcpListClient function. This security flaw can be exploited remotely, enabling attackers to execute arbitrary code. The exploit method has been made public, raising significant concern among users regarding their device security. The vendor, Tenda, did not respond to early disclosure attempts regarding this issue, further emphasizing the importance of implementing protective measures.

Affected Version(s)

AC10U 15.03.06.49_multi_TDE01

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

chenjun ma (VulDB User)
.