漏洞标题
"解决Tenda A301设置OnlineDevName从SetWirelessRepeat堆栈溢出的问题"
漏洞描述信息
一个被标记为“严重”的漏洞在Tenda A301的15.13.08.12版本中被发现。这个漏洞影响了文件/goform/SetOnlineDevName中的fromSetWirelessRepeat功能。通过操作参数devName,会导致基于堆栈的缓冲区溢出。此攻击可远程执行。漏洞已被公开披露,且可能被利用。与此漏洞关联的标识符为VDB-269947。注意:关于此次披露,厂商在早期被通知,但未做出任何回应。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
跨界内存写
漏洞标题
Tenda A301 SetOnlineDevName fromSetWirelessRepeat stack-based overflow
漏洞描述信息
A vulnerability classified as critical was found in Tenda A301 15.13.08.12. Affected by this vulnerability is the function fromSetWirelessRepeat of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269947. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞类别
栈缓冲区溢出
漏洞标题
Tenda A301 安全漏洞
漏洞描述信息
Tenda A301是中国腾达(Tenda)公司的一款无线信号扩展器。 Tenda A301 15.13.08.12版本存在安全漏洞,该漏洞源于对参数 devName 的错误操作会导致基于堆栈的缓冲区溢出。
CVSS信息
N/A
漏洞类别
其他