Vulnerability Description
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tendacn | Ac7 Firmware | <= 15.03.06.44_cn |
| Tendacn | Ac7 | - |
| Tendacn | Ac9 Firmware | <= v15.03.05.19\(6318\)_cn |
| Tendacn | Ac9 | - |
| Tendacn | Ac10 Firmware | <= 15.03.06.23_cn |
| Tendacn | Ac10 | - |
| Tendacn | Ac15 Firmware | <= 15.03.05.19_cn |
| Tendacn | Ac15 | - |
| Tendacn | Ac18 Firmware | <= 15.03.05.19\(6318\)_cn |
| Tendacn | Ac18 | - |
Related Weaknesses (CWE)
References
- https://github.com/ZIllR0/Routers/blob/master/Tendaoob1.mdExploitThird Party Advisory
- https://github.com/ZIllR0/Routers/blob/master/Tendaoob1.mdExploitThird Party Advisory
FAQ
What is CVE-2018-14492?
CVE-2018-14492 is a vulnerability with a CVSS score of 7.5 (HIGH). Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an ...
How severe is CVE-2018-14492?
CVE-2018-14492 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14492?
Check the references section above for vendor advisories and patch information. Affected products include: Tendacn Ac7 Firmware, Tendacn Ac7, Tendacn Ac9 Firmware, Tendacn Ac9, Tendacn Ac10 Firmware.