Tenda AC15 Firmware 15.03.20 Multi

CPE Details

Tenda AC15 Firmware 15.03.20 Multi
15.03.20_multi
2024-08-05
11h08 +00:00
2024-08-05
11h08 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:tenda:ac15_firmware:15.03.20_multi:*:*:*:*:*:*:*

Informations

Vendor

tenda

Product

ac15_firmware

Version

15.03.20_multi

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-30645 2024-03-28 23h00 +00:00 Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.
8
Haute
CVE-2024-2855 2024-03-24 06h00 +00:00 A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.05.19/15.03.20. Affected by this vulnerability is the function fromSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257779. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
9.8
Critique
CVE-2024-2852 2024-03-24 04h31 +00:00 A vulnerability was found in Tenda AC15 15.03.20_multi. It has been declared as critical. This vulnerability affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
9.8
Critique
CVE-2024-2851 2024-03-24 03h00 +00:00 A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been classified as critical. This affects the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257775. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
9.8
Critique