CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
80.6%
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router’s web server – httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
Vendor | Product | Version | CPE |
---|---|---|---|
tendacn | ac6_firmware | v15.03.05.19_multi_td01 | cpe:2.3:o:tendacn:ac6_firmware:v15.03.05.19_multi_td01:*:*:*:*:*:*:* |
tendacn | ac6 | 1.0 | cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:* |
tendacn | ac9_firmware | v15.03.05.19(6318) | cpe:2.3:o:tendacn:ac9_firmware:v15.03.05.19\(6318\):*:*:*:*:*:*:* |
tendacn | ac9 | 1.0 | cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:* |
tendacn | ac15_firmware | v15.03.05.19_multi_td01 | cpe:2.3:o:tendacn:ac15_firmware:v15.03.05.19_multi_td01:*:*:*:*:*:*:* |
tendacn | ac15 | 1.0 | cpe:2.3:h:tendacn:ac15:1.0:*:*:*:*:*:*:* |
tendacn | ac18_firmware | v15.03.05.19(6318) | cpe:2.3:o:tendacn:ac18_firmware:v15.03.05.19\(6318\):*:*:*:*:*:*:* |
tendacn | ac18 | - | cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:* |
tendacn | ac9_firmware | v15.03.06.42_multi | cpe:2.3:o:tendacn:ac9_firmware:v15.03.06.42_multi:*:*:*:*:*:*:* |
tendacn | ac9 | 3.0 | cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
80.6%