Required CVE Record Information
Description
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critical. This affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261141 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 3 Total
Score | Severity | Version | Vector String |
---|---|---|---|
8.8 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
8.8 | HIGH | 3.0 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
9.0 | — | 2.0 | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Credits
- wxhwxhwxh_mie (VulDB User) reporter
References 4 Total
- vuldb.com: VDB-261141 | Tenda AC500 execCommand R7WebsSecurityHandler stack-based overflow vdb-entrytechnical-description
- vuldb.com: VDB-261141 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-required
- vuldb.com: Submit #313790 | Tenda AC500 V2.0.1.9(1307) buffer overflow third-party-advisory
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md exploit
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 4 Total
- vuldb.com: VDB-261141 | Tenda AC500 execCommand R7WebsSecurityHandler stack-based overflow vdb-entrytechnical-descriptionx_transferred
- vuldb.com: VDB-261141 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-requiredx_transferred
- vuldb.com: Submit #313790 | Tenda AC500 V2.0.1.9(1307) buffer overflow third-party-advisoryx_transferred
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md exploitx_transferred