Shenzhen Tenda Technology Co.,Ltd. の i22 ファームウェアにおける古典的バッファオーバーフローの脆弱性
Title |
Shenzhen Tenda Technology Co.,Ltd. の i22 ファームウェアにおける古典的バッファオーバーフローの脆弱性
|
Summary |
Shenzhen Tenda Technology Co.,Ltd. の i22 ファームウェアには、古典的バッファオーバーフローの脆弱性が存在します。
|
Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
Solution |
参考情報を参照して適切な対策を実施してください。 |
Publication Date |
Aug. 7, 2024, midnight |
Registration Date |
Sept. 12, 2024, 2:56 p.m. |
Last Update |
Sept. 12, 2024, 2:56 p.m. |
CVSS3.0 : 緊急
|
Score |
9.8
|
Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS2.0 : 危険
|
Score |
9
|
Vector |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Affected System
Shenzhen Tenda Technology Co.,Ltd. |
i22 ファームウェア 1.0.0.3(4687)
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No |
Changed Details |
Date of change |
1 |
[2024年09月12日] 掲載 |
Sept. 12, 2024, 2:56 p.m. |
NVD Vulnerability Information
CVE-2024-7585
Summary |
A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as critical. Affected by this vulnerability is the function formApPortalWebAuth of the file /goform/apPortalAuth. The manipulation of the argument webUserName/webUserPassword leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
Publication Date |
Aug. 8, 2024, 2:15 a.m. |
Registration Date |
Aug. 8, 2024, 5 a.m. |
Last Update |
Sept. 12, 2024, 4:32 a.m. |
Affected software configurations
Configuration1 |
or higher |
or less |
more than |
less than |
cpe:2.3:o:tenda:i22_firmware:1.0.0.3\(4687\):*:*:*:*:*:*:* |
|
|
|
|
execution environment |
1 |
cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List