Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ac18_firmware
(Tendacn)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 20 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-07-16 | CVE-2024-33180 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo. | Ac18_firmware | 9.8 | ||
2024-07-16 | CVE-2024-33182 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter. | Ac18_firmware | 9.8 | ||
2018-07-21 | CVE-2018-14492 | Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI. | Ac10_firmware, Ac15_firmware, Ac18_firmware, Ac7_firmware, Ac9_firmware | 7.5 | ||
2018-09-02 | CVE-2018-16333 | An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server. While processing the ssid parameter for a POST request, the value is directly used in a sprintf call to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow. | Ac10_firmware, Ac15_firmware, Ac18_firmware, Ac7_firmware, Ac9_firmware | 7.5 |