{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0930","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-26T08:22:04.364Z","datePublished":"2024-01-26T16:00:07.582Z","dateUpdated":"2024-09-12T18:28:00.533Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-26T16:00:07.582Z"},"title":"Tenda AC10U fromSetWirelessRepeat stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"CWE-121 Stack-based Buffer Overflow"}]}],"affected":[{"vendor":"Tenda","product":"AC10U","versions":[{"version":"15.03.06.49_multi_TDE01","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Tenda AC10U 15.03.06.49_multi_TDE01 entdeckt. Sie wurde als kritisch eingestuft. Es betrifft die Funktion fromSetWirelessRepeat. Durch Manipulation des Arguments wpapsk_crypto mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-26T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-26T09:27:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"chenjun ma (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.252135","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.252135","tags":["signature","permissions-required"]},{"url":"https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:18:19.064Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.252135","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.252135","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md","tags":["exploit","x_transferred"]}]},{"affected":[{"vendor":"tendacn","product":"ac10u_firmware","cpes":["cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.49_multi_tde01","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-12T18:07:02.160766Z","id":"CVE-2024-0930","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T18:28:00.533Z"}}]}}