Stack-Based Buffer Overflow in Tenda O3 Devices
CVE-2024-6964
Key Information:
Badges
Summary
A critical vulnerability has been identified in Tenda O3 devices, specifically in version 1.0.0.10. The issue resides in the fromDhcpSetSer function, where improper handling of parameters such as dhcpEn, startIP, endIP, preDNS, altDNS, mask, and gateway can lead to a stack-based buffer overflow. This flaw allows attackers to execute arbitrary code remotely, posing significant security risks to users. Despite being disclosed publicly, the vendor has not responded to early notifications regarding this vulnerability. Users are advised to assess their device's security and apply necessary mitigations to safeguard against potential attacks.
Affected Version(s)
O3 1.0.0.10
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved