Stack-Based Buffer Overflow Vulnerability in Tenda A301
CVE-2024-6403
Key Information:
Badges
Summary
A serious stack-based buffer overflow vulnerability has been identified in Tenda A301, specifically within the formWifiBasicSet function of the /goform/SetOnlineDevName file. This vulnerability arises due to improper validation of the devName argument, allowing attackers to execute a remote exploit. If leveraged, this vulnerability could lead to severe system compromises. Despite the early disclosure of the issue to Tenda, there has been no acknowledgment or mitigation response from the vendor. Owners of affected devices are strongly advised to review their security measures and consider updating their firmware to safeguard against potential attacks.
Affected Version(s)
A301 15.13.08.12
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved