Stack-Based Buffer Overflow in Tenda W15E Router
CVE-2024-4127
8.8HIGH
Summary
A severe stack-based buffer overflow vulnerability has been identified in the Tenda W15E router's guest Wi-Fi functionality. An attacker can exploit this vulnerability through a manipulation of the qosGuestDownstream argument in the guestWifiRuleRefresh function, potentially allowing for unauthorized remote access and execution of arbitrary code. This issue underscores critical security risks associated with IoT devices and emphasizes the need for immediate updates and patches. The vendor has been notified about this vulnerability, but no response has been recorded as of yet, highlighting a concerning lack of communication regarding security practices.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published