A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Sun, 16 Feb 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Title | Tenda A15 Web-based Management Interface WifiExtraSet stack-based overflow | Tenda A15 Web-based Management Interface WifiExtraSet set_repeat5 stack-based overflow |
Weaknesses | CWE-119 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-16T08:55:17.217Z
Reserved: 2024-01-14T16:44:16.404Z
Link: CVE-2024-0532

No data.

Status : Modified
Published: 2024-01-15T02:15:15.650
Modified: 2025-02-16T09:15:07.263
Link: CVE-2024-0532

No data.