Stack-Based Buffer Overflow in Tenda i21 Router Model
CVE-2024-4495
Key Information:
Badges
Summary
A critical vulnerability has been identified in the Tenda i21 router, specifically in the function 'formWifiMacFilterGet'. This vulnerability can be exploited by manipulating the argument index, which leads to a stack-based buffer overflow. This security flaw allows for remote attacks, posing a substantial risk to users' network integrity. Despite early disclosure attempts to the vendor, Tenda has not responded. As attackers may leverage this vulnerability, it is crucial for users of the affected version (1.0.0.14) to take immediate action to secure their devices and networks.
Affected Version(s)
i21 1.0.0.14(4656)
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved