Tenda O3V2 v1.0.0.12(3880) was discovered to contain a Blind Command Injection via stpEn parameter in the SetStp function. This vulnerability allows attackers to execute arbitrary commands with root privileges.
References
Link | Resource |
---|---|
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenda
Tenda o3 Tenda o3 Firmware |
|
CPE | cpe:2.3:o:tendacn:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* |
cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* |
Information
Published : 2024-06-04 19:20
Updated : 2024-12-13 15:15
NVD link : CVE-2024-36604
Mitre link : CVE-2024-36604
CVE.ORG link : CVE-2024-36604
JSON object : View
Products Affected
tenda
- o3_firmware
- o3
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')