Product:

Ac18_firmware

(Tenda)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 79
Date Id Summary Products Score Patch Annotated
2023-01-26 CVE-2023-24164 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_000c2318. Ac18_firmware 9.8
2023-01-26 CVE-2023-24165 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/initIpAddrInfo. Ac18_firmware 9.8
2023-01-26 CVE-2023-24166 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/formWifiBasicSet. Ac18_firmware 9.8
2023-01-26 CVE-2023-24167 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/add_white_node. Ac18_firmware 9.8
2023-01-26 CVE-2023-24169 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_0007343c. Ac18_firmware 9.8
2023-01-26 CVE-2023-24170 Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/fromSetWirelessRepeat. Ac18_firmware 9.8
2024-03-12 CVE-2024-28535 Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the mitInterface parameter of fromAddressNat function. Ac18_firmware 9.8
2024-03-12 CVE-2024-28553 Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the entrys parameter fromAddressNat function. Ac18_firmware 9.8
2024-03-24 CVE-2024-2854 A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected is the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257778 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Ac18_firmware 9.8
2024-10-23 CVE-2024-10280 A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Ac10_firmware, Ac10u_firmware, Ac1206_firmware, Ac15_firmware, Ac18_firmware, Ac500_firmware, Ac6_firmware, Ac7_firmware, Ac8_firmware, Ac9_firmware 7.5