CVE-2024-0532

A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?submit.262690
https://www.tenda.com.cn/
https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.250702 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.250702 Permissions Required Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*

History

16 Feb 2025, 09:15

Type Values Removed Values Added
References
  • () https://vuldb.com/?submit.262690 -
  • () https://www.tenda.com.cn/ -
CWE CWE-119
Summary (en) A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Information

Published : 2024-01-15 02:15

Updated : 2025-02-16 09:15


NVD link : CVE-2024-0532

Mitre link : CVE-2024-0532

CVE.ORG link : CVE-2024-0532


JSON object : View

Products Affected

tenda

  • a15
  • a15_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write