Tenda RX9 Pro Vulnerability: Stack-Based Buffer Overflow Threat
CVE-2024-10351

8.8HIGH

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
25 October 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A security vulnerability has been identified in the Tenda RX9 Pro router, specifically within the function sub_424CE0 of the component responsible for handling POST requests. The issue arises from improper handling of the 'deviceList' argument within the MAC filter configuration. This manipulation can lead to a stack-based buffer overflow, potentially allowing an attacker to execute arbitrary code remotely. With the exploit now publicly disclosed, users are advised to take immediate action and apply necessary security measures to safeguard their devices.

Affected Version(s)

RX9 Pro 22.03.02.20

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

GuoXB (VulDB User)
.