Lucene search

K
cveVulDBCVE-2024-2853
HistoryMar 24, 2024 - 5:15 a.m.

CVE-2024-2853

2024-03-2405:15:10
CWE-78
VulDB
web.nvd.nist.gov
42
tenda ac10u
remote
os command injection
vulnerability
nvd
critical
public disclosure
exploit
vendor contact

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

35.0%

A vulnerability was found in Tenda AC10U 15.03.06.48/15.03.06.49. It has been rated as critical. This issue affects the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected configurations

Nvd
Vulners
Node
tendaac10u_firmwareMatch15.03.06.48
OR
tendaac10u_firmwareMatch15.03.06.49
AND
tendaac10uMatch1.0
VendorProductVersionCPE
tendaac10u_firmware15.03.06.48cpe:2.3:o:tenda:ac10u_firmware:15.03.06.48:*:*:*:*:*:*:*
tendaac10u_firmware15.03.06.49cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49:*:*:*:*:*:*:*
tendaac10u1.0cpe:2.3:h:tenda:ac10u:1.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Tenda",
    "product": "AC10U",
    "versions": [
      {
        "version": "15.03.06.48",
        "status": "affected"
      },
      {
        "version": "15.03.06.49",
        "status": "affected"
      }
    ]
  }
]

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

35.0%

Related for CVE-2024-2853