Vulnerability Description
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tendacn | Pa6 Firmware | 1.0.1.21 |
| Tendacn | Pa6 | - |
Related Weaknesses (CWE)
References
- https://securityintelligence.com/posts/vulnerable-powerline-extenders-underline-ExploitThird Party Advisory
- https://securityintelligence.com/posts/vulnerable-powerline-extenders-underline-ExploitThird Party Advisory
FAQ
What is CVE-2019-19505?
CVE-2019-19505 is a vulnerability with a CVSS score of 8.8 (HIGH). Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted h...
How severe is CVE-2019-19505?
CVE-2019-19505 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19505?
Check the references section above for vendor advisories and patch information. Affected products include: Tendacn Pa6 Firmware, Tendacn Pa6.