Metrics
Affected Vendors & Products
Thu, 14 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda ac10
|
|
CPEs | cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:* | |
Vendors & Products |
Tenda ac10
|
Tue, 12 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda
Tenda ac10 Firmware |
|
CPEs | cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:* | |
Vendors & Products |
Tenda
Tenda ac10 Firmware |
|
Metrics |
ssvc
|
Sun, 10 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, was found in Tenda AC10 16.03.10.13. Affected is the function FUN_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | Tenda AC10 WifiExtraSet FUN_0046AC38 stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-12T20:11:15.388Z
Reserved: 2024-11-09T20:14:34.790Z
Link: CVE-2024-11056

Updated: 2024-11-12T20:10:47.673Z

Status : Analyzed
Published: 2024-11-10T17:15:15.697
Modified: 2024-11-14T15:21:09.907
Link: CVE-2024-11056

No data.