{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10280","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-23T06:02:03.363Z","datePublished":"2024-10-23T13:31:07.315Z","dateUpdated":"2024-10-23T17:41:57.370Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-23T13:31:07.315Z"},"title":"Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]}],"affected":[{"vendor":"Tenda","product":"AC6","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC7","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC8","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC9","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC10","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC10U","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC15","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC18","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC500","versions":[{"version":"20241022","status":"affected"}]},{"vendor":"Tenda","product":"AC1206","versions":[{"version":"20241022","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Eine Schwachstelle wurde in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 bis 20241022 ausgemacht. Sie wurde als problematisch eingestuft. Davon betroffen ist die Funktion websReadEvent der Datei /goform/GetIPTV. Durch Beeinflussen des Arguments Content-Length mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.8,"vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}}],"timeline":[{"time":"2024-10-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-23T08:07:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"minipython (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.281555","name":"VDB-281555 | Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.281555","name":"VDB-281555 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.426417","name":"Submit #426417 | Tenda AC8v4 V16.03.34.06 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://github.com/JohenanLi/router_vuls/blob/main/websReadEvent/websReadEvent.md","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"tenda","product":"ac6_firmware","cpes":["cpe:2.3:o:tenda:ac6_firmware:15.03.06.23:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.23","status":"affected"}]},{"vendor":"tenda","product":"ac8_firmware","cpes":["cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"16.03.34.06","status":"affected"}]},{"vendor":"tenda","product":"ac8_firmware","cpes":["cpe:2.3:a:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"16.03.34.09","status":"affected"}]},{"vendor":"tenda","product":"ac10_firmware","cpes":["cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"16.03.48.23","status":"affected"},{"version":"16.03.48.19","status":"affected"},{"version":"16.03.48.20","status":"affected"},{"version":"16.03.48.13","status":"affected"}]},{"vendor":"tenda","product":"ac1206_firmware","cpes":["cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.23","status":"affected"}]},{"vendor":"tenda","product":"ac9_firmware","cpes":["cpe:2.3:o:tenda:ac9_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.42","status":"affected"},{"version":"15.03.05.19\\(6318_\\)","status":"affected"},{"version":"15.03.05.14","status":"affected"},{"version":"15.03.2.13","status":"affected"}]},{"vendor":"tenda","product":"ac18_firmware","cpes":["cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.05.05","status":"affected"}]},{"vendor":"tenda","product":"ac18_firmware","cpes":["cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.05.19\\(6318\\)","status":"affected"}]},{"vendor":"tenda","product":"ac500_firmware","cpes":["cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.0.1.9\\(1307\\)","status":"affected"}]},{"vendor":"tenda","product":"ac500_firmware","cpes":["cpe:2.3:o:tenda:ac500_firmware:1.0.0.16:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0.16","status":"affected"}]},{"vendor":"tenda","product":"ac500_firmware","cpes":["cpe:2.3:o:tenda:ac500_firmware:1.0.0.14:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0.14","status":"affected"}]},{"vendor":"tenda","product":"ac10u_firmware","cpes":["cpe:2.3:o:tenda:ac10u_firmware:15.03.06.48:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.48","status":"affected"}]},{"vendor":"tenda","product":"ac10u_firmware","cpes":["cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.49","status":"affected"}]},{"vendor":"tenda","product":"ac7_firmware","cpes":["cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.06.44","status":"affected"}]},{"vendor":"tenda","product":"ac15_firmware","cpes":["cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.05.18","status":"affected"}]},{"vendor":"tenda","product":"ac15_firmware","cpes":["cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.03.05.19","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T17:28:19.760214Z","id":"CVE-2024-10280","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T17:41:57.370Z"}}]}}