Tenda Technology AC18 Firmware 15.03.3.10

CPE Details

Tenda Technology AC18 Firmware 15.03.3.10
15.03.3.10
2018-10-25
11h35 +00:00
2021-06-03
16h00 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:tendacn:ac18_firmware:15.03.3.10:*:*:*:*:*:*:*

Informations

Vendor

tendacn

Product

ac18_firmware

Version

15.03.3.10

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-33180 2024-07-15 22h00 +00:00 Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo.
9.8
Critical
CVE-2024-33182 2024-07-15 22h00 +00:00 Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter.
9.8
Critical
CVE-2020-24987 2020-09-04 17h24 +00:00 Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to "radius".
9.8
Critical
CVE-2018-16333 2018-09-02 01h00 +00:00 An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server. While processing the ssid parameter for a POST request, the value is directly used in a sprintf call to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.
7.5
High
CVE-2018-14492 2018-07-21 12h00 +00:00 Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
7.5
High