Metrics
Affected Vendors & Products
Fri, 01 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda rx9 Pro
|
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:* | |
Vendors & Products |
Tenda rx9 Pro
|
Fri, 25 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda
Tenda rx9 Pro Firmware |
|
CPEs | cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:* | |
Vendors & Products |
Tenda
Tenda rx9 Pro Firmware |
|
Metrics |
ssvc
|
Thu, 24 Oct 2024 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Tenda RX9 Pro 22.03.02.20. It has been rated as critical. This issue affects the function sub_424CE0 of the file /goform/setMacFilterCfg of the component POST Request Handler. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
Title | Tenda RX9 Pro POST Request setMacFilterCfg sub_424CE0 stack-based overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-10-25T20:50:14.294Z
Reserved: 2024-10-24T15:34:29.365Z
Link: CVE-2024-10351

Updated: 2024-10-25T20:50:03.820Z

Status : Analyzed
Published: 2024-10-25T00:15:02.533
Modified: 2024-11-01T16:15:23.800
Link: CVE-2024-10351

No data.