VARIoT IoT vulnerabilities database

VAR-202404-0440 | CVE-2024-32316 | Shenzhen Tenda Technology Co.,Ltd. of ac500 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability in the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of ac500 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda AC500 is a wireless controller device designed for small and medium-sized enterprises, supporting cross-VLAN management of wireless networks.
Tenda AC500 has a buffer overflow vulnerability, which stems from the failure of the list1 parameter of the fromDhcpListClient method to properly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-0441 | CVE-2024-32314 | Shenzhen Tenda Technology Co.,Ltd. of ac500 Command injection vulnerability in firmware |
CVSS V2: 4.7 CVSS V3: 3.8 Severity: LOW |
Tenda AC500 V2.0.1.9(1307) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter. Shenzhen Tenda Technology Co.,Ltd. Tenda AC500 is a wireless controller device designed for small and medium-sized enterprises, supporting cross-VLAN management of wireless networks. No detailed vulnerability details are currently available
VAR-202404-0832 | CVE-2024-32305 | Shenzhen Tenda Technology Co.,Ltd. of A18 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Tenda A18 v15.03.05.05 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function. Shenzhen Tenda Technology Co.,Ltd. of A18 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda A18 is a dual-band wireless signal extender designed for duplexes, villas and large apartments over 120 square meters. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-0833 | CVE-2024-32303 | Shenzhen Tenda Technology Co.,Ltd. of AC15 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: - CVSS V3: 8.0 Severity: HIGH |
Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function. Shenzhen Tenda Technology Co.,Ltd. of AC15 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202404-2059 | CVE-2023-46060 | Shenzhen Tenda Technology Co.,Ltd. of ac500 Classic buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 7.5 Severity: HIGH |
A Buffer Overflow vulnerability in Tenda AC500 v.2.0.1.9 allows a remote attacker to cause a denial of service via the port parameter at the goform/setVlanInfo component. Shenzhen Tenda Technology Co.,Ltd. of ac500 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Tenda AC500 is a wireless controller device designed for small and medium-sized enterprises, supporting cross-VLAN management of wireless networks
VAR-202404-1584 | CVE-2024-32315 | Shenzhen Tenda Technology Co.,Ltd. of FH1202 Out-of-bounds write vulnerability in firmware |
CVSS V2: 5.8 CVSS V3: 4.7 Severity: MEDIUM |
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function. Shenzhen Tenda Technology Co.,Ltd. of FH1202 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH1202 is a dual-band wireless router launched by Tenda, supporting 2.4GHz and 5GHz bands, with a total transmission rate of 1200Mbps.
Tenda FH1202 has a buffer overflow vulnerability, which stems from the fact that the adslPwd parameter of the formWanParameterSetting method fails to correctly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-1585 | CVE-2024-32311 | Shenzhen Tenda Technology Co.,Ltd. of fh1203 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function. Shenzhen Tenda Technology Co.,Ltd. of fh1203 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda FH1203 is a dual-band wireless router released by China's Tenda Corporation, primarily used for home network coverage. This vulnerability stems from the adslPwd parameter in the formWanParameterSetting method failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202404-1758 | CVE-2024-32302 | Shenzhen Tenda Technology Co.,Ltd. of FH1202 Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: MEDIUM |
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function. Shenzhen Tenda Technology Co.,Ltd. of FH1202 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda FH1202 is a dual-band wireless router launched by Tenda, supporting 2.4GHz and 5GHz bands, with a total transmission rate of 1200Mbps. Attackers can exploit this vulnerability to cause a denial of service
VAR-202404-2559 | CVE-2024-32299 | Shenzhen Tenda Technology Co.,Ltd. of fh1203 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function. Shenzhen Tenda Technology Co.,Ltd. of fh1203 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda FH1203 is a dual-band wireless router released by China's Tenda, primarily used for home network coverage. This vulnerability stems from the failure of the PPW parameter in the fromWizardHandle method to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service
VAR-202404-1586 | CVE-2024-32293 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-1932 | CVE-2024-32292 | Shenzhen Tenda Technology Co.,Ltd. of w30e Command injection vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Tenda W30E v1.0 V1.0.1.25(633) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology.
The Tenda W30E suffers from a command injection vulnerability caused by the cmdinput parameter of the formexeCommand method failing to properly filter special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202404-1204 | CVE-2024-32291 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Tenda W30E v1.0 firmware v1.0.1.25(633) has a stack overflow vulnerability via the page parameter in the fromNatlimit function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to cause a denial of service
VAR-202404-0834 | CVE-2024-32290 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 8.0 CVSS V3: 6.7 Severity: MEDIUM |
Tenda W30E v1.0 v1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromAddressNat function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. Detailed vulnerability details are currently unavailable
VAR-202404-2260 | CVE-2024-32288 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: MEDIUM |
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromwebExcptypemanFilter function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to cause a denial of service
VAR-202404-1759 | CVE-2024-32287 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the qos parameter in the fromqossetting function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to cause a denial of service
VAR-202404-2403 | CVE-2024-32286 | Shenzhen Tenda Technology Co.,Ltd. of w30e Out-of-bounds read vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromVirtualSer function. Shenzhen Tenda Technology Co.,Ltd. of w30e An out-of-bounds read vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-2353 | CVE-2024-32285 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the password parameter in the formaddUserName function. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHO, small and micro-enterprise offices, and small shops, supporting Wi-Fi 6 technology. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202404-1760 | CVE-2024-32283 | Shenzhen Tenda Technology Co.,Ltd. of fh1203 Command injection vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.3 Severity: HIGH |
Tenda FH1203 V2.0.1.6 firmware has a command injection vulnerablility in formexeCommand function via the cmdinput parameter. Shenzhen Tenda Technology Co.,Ltd. of fh1203 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda FH1203 is a dual-band wireless router released by China's Tenda Group, primarily used for home network coverage. This vulnerability stems from the cmdinput parameter of the formexeCommand method failing to properly filter special characters and commands when constructing commands. An attacker could exploit this vulnerability to execute arbitrary commands
VAR-202404-1933 | CVE-2024-32282 | Shenzhen Tenda Technology Co.,Ltd. of FH1202 Command injection vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: MEDIUM |
Tenda FH1202 v1.2.0.14(408) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter. Shenzhen Tenda Technology Co.,Ltd. (DoS) It may be in a state. Tenda FH1202 is a dual-band wireless router launched by Tenda, supporting 2.4GHz and 5GHz bands, with a total transmission rate of 1200Mbps. No detailed vulnerability details are currently provided
VAR-202404-0831 | CVE-2024-32313 | Shenzhen Tenda Technology Co.,Ltd. of fh1205 Stack-based buffer overflow vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the adslPwd parameter of the formWanParameterSetting function. Shenzhen Tenda Technology Co.,Ltd. of fh1205 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda FH1205 is a dual-band wireless router for home users. It supports the IEEE 802.11ac standard, offers wireless speeds up to 1200 Mbps, and operates in both the 2.4 GHz and 5 GHz frequency bands. This vulnerability stems from the adslPwd parameter in the formWanParameterSetting method failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service