An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copied to the stack variable.
References
Link | Resource |
---|---|
https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 May 2021, 14:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1 - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CWE | CWE-787 |
07 May 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-07 23:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-31756
Mitre link : CVE-2021-31756
CVE.ORG link : CVE-2021-31756
JSON object : View
Products Affected
tenda
- ac11_firmware
- ac11
CWE
CWE-787
Out-of-bounds Write