A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Jan 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda
Tenda i21 Tenda i21 Firmware |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i21_firmware:1.0.0.14\(4656\):*:*:*:*:*:*:* |
|
Vendors & Products |
Tenda
Tenda i21 Tenda i21 Firmware |

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:40:47.436Z
Reserved: 2024-05-04T07:22:44.057Z
Link: CVE-2024-4493

Updated: 2024-08-01T20:40:47.436Z

Status : Analyzed
Published: 2024-05-05T03:15:07.340
Modified: 2025-01-27T18:35:12.380
Link: CVE-2024-4493

No data.