Tenda AC10U saveParentControlInfo stack-based overflow
CVE-2024-0931
Key Information:
Badges
Summary
A security vulnerability has been identified in the Tenda AC10U router related to the saveParentControlInfo function. This issue involves a stack-based buffer overflow caused by improper handling of the deviceId, time, and urls arguments. The exploit could potentially be executed remotely, posing significant risks to the integrity of affected systems. The vulnerability has been publicly disclosed, raising concerns over potential exploitation in live environments. Users are advised to check their affected devices and apply necessary security measures immediately.
Affected Version(s)
AC10U 15.03.06.49_multi_TDE01
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved