Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the password parameter in the formaddUserName function.
References
Link | Resource |
---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md | Exploit Third Party Advisory |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Mar 2025, 15:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenda
Tenda w30e Firmware Tenda w30e |
|
References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\(633\):*:*:*:*:*:*:* cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:* |
Information
Published : 2024-04-17 14:15
Updated : 2025-03-17 15:59
NVD link : CVE-2024-32285
Mitre link : CVE-2024-32285
CVE.ORG link : CVE-2024-32285
JSON object : View
Products Affected
tenda
- w30e
- w30e_firmware
CWE
CWE-121
Stack-based Buffer Overflow