Stack-Based Buffer Overflow in Tenda G3 Router
CVE-2024-4164

8.8HIGH

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
25 April 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A critical vulnerability in the Tenda G3 router can be exploited through the formModifyPppAuthWhiteMac function, located in the /goform/ModifyPppAuthWhiteMac file. An attacker can manipulate the pppoeServerWhiteMacIndex argument, resulting in a stack-based buffer overflow. This security flaw allows for remote attacks, making unauthorized access and potentially harmful actions possible on affected devices. Despite early notifications to the vendor, Tenda has not addressed this serious issue, leaving users at risk of exploitation. It is essential for users of Tenda G3 15.11.0.17(9502) to take immediate precautions to secure their devices.

Affected Version(s)

G3 15.11.0.17(9502)

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

yhryhryhr_tu (VulDB User)
.