Tenda AC8 AdvSetMacMtuWan 来自 AdvSetMacMtuWan 基于堆栈的溢出 (CVE-2024-4066)

CVE编号

CVE-2024-4066

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-24
漏洞描述
A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
CVSS3评分
8.8
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-121 栈缓冲区溢出
阿里云安全产品覆盖情况