CVE-2024-32285

Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the password parameter in the formaddUserName function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\(633\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*

History

17 Mar 2025, 15:59

Type Values Removed Values Added
First Time Tenda
Tenda w30e Firmware
Tenda w30e
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md - Exploit, Third Party Advisory
CPE cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\(633\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*

Information

Published : 2024-04-17 14:15

Updated : 2025-03-17 15:59


NVD link : CVE-2024-32285

Mitre link : CVE-2024-32285

CVE.ORG link : CVE-2024-32285


JSON object : View

Products Affected

tenda

  • w30e
  • w30e_firmware
CWE
CWE-121

Stack-based Buffer Overflow