Stack-Based Buffer Overflow in Tenda AC15 Cookie Handler
CVE-2024-2815

9.8CRITICAL

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
22 March 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A critical vulnerability has been identified in the Tenda AC15 router, specifically within the R7WebsSecurityHandler function found in the Cookie Handler component. This issue arises from improper handling of input parameters, which leads to a stack-based buffer overflow when the password argument is manipulated. This flaw can be exploited remotely, putting the device and connected networks at risk of unauthorized access and control. It is important for users and administrators of the affected Tenda AC15 version 15.03.20_multi to take precautionary measures to mitigate potential threats. The vendor has been informed of this exploitation risk but has not provided a response or a fix as of yet.

Affected Version(s)

AC15 15.03.20_multi

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

yhryhryhr_tutu (VulDB User)
.