ID

VAR-202411-0632


CVE

CVE-2024-51116


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-021956

DESCRIPTION

Tenda AC6 v2.0 V15.03.06.50 was discovered to contain a buffer overflow in the function 'formSetPPTPServer'. Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the failure to properly verify the length of the input data in the function formSetPPTPServer. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack

Trust: 2.16

sources: NVD: CVE-2024-51116 // JVNDB: JVNDB-2024-021956 // CNVD: CNVD-2024-44862

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-44862

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.06.50

Trust: 1.0

vendor:tendamodel:ac6scope: - version: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion:ac6 firmware 15.03.06.50

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion:v2.0v15.03.06.50

Trust: 0.6

sources: CNVD: CNVD-2024-44862 // JVNDB: JVNDB-2024-021956 // NVD: CVE-2024-51116

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-51116
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-021956
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-44862
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-44862
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-51116
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-021956
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-44862 // JVNDB: JVNDB-2024-021956 // NVD: CVE-2024-51116

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-021956 // NVD: CVE-2024-51116

PATCH

title:Patch for Tenda AC6 Buffer Overflow Vulnerability (CNVD-2024-44862)url:https://www.cnvd.org.cn/patchInfo/show/618231

Trust: 0.6

sources: CNVD: CNVD-2024-44862

EXTERNAL IDS

db:NVDid:CVE-2024-51116

Trust: 3.2

db:JVNDBid:JVNDB-2024-021956

Trust: 0.8

db:CNVDid:CNVD-2024-44862

Trust: 0.6

sources: CNVD: CNVD-2024-44862 // JVNDB: JVNDB-2024-021956 // NVD: CVE-2024-51116

REFERENCES

url:https://github.com/clan-nad/cve/blob/main/tenda/formsetpptpserver/readme.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2024-51116

Trust: 0.8

sources: CNVD: CNVD-2024-44862 // JVNDB: JVNDB-2024-021956 // NVD: CVE-2024-51116

SOURCES

db:CNVDid:CNVD-2024-44862
db:JVNDBid:JVNDB-2024-021956
db:NVDid:CVE-2024-51116

LAST UPDATE DATE

2025-04-13T23:17:01.167000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-44862date:2024-11-14T00:00:00
db:JVNDBid:JVNDB-2024-021956date:2025-04-11T14:27:00
db:NVDid:CVE-2024-51116date:2025-04-09T18:47:22.867

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-44862date:2024-11-14T00:00:00
db:JVNDBid:JVNDB-2024-021956date:2025-04-11T00:00:00
db:NVDid:CVE-2024-51116date:2024-11-05T22:15:21.477