Lucene search

K
cveMitreCVE-2020-13392
HistoryMay 22, 2020 - 5:15 p.m.

CVE-2020-13392

2020-05-2217:15:11
CWE-120
mitre
web.nvd.nist.gov
81
cve-2020-13392
buffer overflow
tenda
router
web server
security vulnerability
code execution
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.007

Percentile

80.6%

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router’s web server – httpd. While processing the /goform/setcfm funcpara1 parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Affected configurations

Nvd
Node
tendacnac6_firmwareMatchv15.03.05.19_multi_td01
AND
tendacnac6Match1.0
Node
tendacnac9_firmwareMatchv15.03.05.19\(6318\)
AND
tendacnac9Match1.0
Node
tendacnac15_firmwareMatchv15.03.05.19_multi_td01
AND
tendacnac15Match1.0
Node
tendacnac18_firmwareMatchv15.03.05.19\(6318\)
AND
tendacnac18Match-
Node
tendacnac9_firmwareMatchv15.03.06.42_multi
AND
tendacnac9Match3.0
VendorProductVersionCPE
tendacnac6_firmwarev15.03.05.19_multi_td01cpe:2.3:o:tendacn:ac6_firmware:v15.03.05.19_multi_td01:*:*:*:*:*:*:*
tendacnac61.0cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:*
tendacnac9_firmwarev15.03.05.19(6318)cpe:2.3:o:tendacn:ac9_firmware:v15.03.05.19\(6318\):*:*:*:*:*:*:*
tendacnac91.0cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:*
tendacnac15_firmwarev15.03.05.19_multi_td01cpe:2.3:o:tendacn:ac15_firmware:v15.03.05.19_multi_td01:*:*:*:*:*:*:*
tendacnac151.0cpe:2.3:h:tendacn:ac15:1.0:*:*:*:*:*:*:*
tendacnac18_firmwarev15.03.05.19(6318)cpe:2.3:o:tendacn:ac18_firmware:v15.03.05.19\(6318\):*:*:*:*:*:*:*
tendacnac18-cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*
tendacnac9_firmwarev15.03.06.42_multicpe:2.3:o:tendacn:ac9_firmware:v15.03.06.42_multi:*:*:*:*:*:*:*
tendacnac93.0cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.007

Percentile

80.6%