CVE-2024-0532

A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md Exploit Third Party Advisory
https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?ctiid.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?submit.262690
https://www.tenda.com.cn/
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*

History

16 Feb 2025, 09:15

Type Values Removed Values Added
Summary A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
  • () https://www.tenda.com.cn/ -
  • () https://vuldb.com/?submit.262690 -
References () https://vuldb.com/?id.250702 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?id.250702 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.250702 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?ctiid.250702 - Permissions Required, Third Party Advisory, VDB Entry
CWE CWE-787 CWE-121
CWE-119

19 Jan 2024, 17:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*
CWE CWE-787
References () https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md - () https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md - Exploit, Third Party Advisory
References () https://vuldb.com/?id.250702 - () https://vuldb.com/?id.250702 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.250702 - () https://vuldb.com/?ctiid.250702 - Permissions Required, Third Party Advisory, VDB Entry
First Time Tenda a15
Tenda a15 Firmware
Tenda

15 Jan 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 02:15

Updated : 2025-02-16 09:15


NVD link : CVE-2024-0532

Mitre link : CVE-2024-0532


JSON object : View

Products Affected

tenda

  • a15
  • a15_firmware
CWE
CWE-121

Stack-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer