Vulnerability Description
A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tendacn | Ac9 Firmware | 15.03.06.60_en |
| Tendacn | Ac9 | 3.0 |
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/121.htmlTechnical Description
- https://github.com/grapefruitvul/vulinfo/blob/master/tenda/vul1.mdExploitThird Party Advisory
- https://cwe.mitre.org/data/definitions/121.htmlTechnical Description
- https://github.com/grapefruitvul/vulinfo/blob/master/tenda/vul1.mdExploitThird Party Advisory
FAQ
What is CVE-2020-20746?
CVE-2020-20746 is a vulnerability with a CVSS score of 7.2 (HIGH). A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /gofor...
How severe is CVE-2020-20746?
CVE-2020-20746 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-20746?
Check the references section above for vendor advisories and patch information. Affected products include: Tendacn Ac9 Firmware, Tendacn Ac9.