Vulnerability Description
Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fromDhcpListClient.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | F1202 Firmware | 1.2.0.20\(408\) |
| Tenda | F1202 | - |
| Tenda | Fh1202 Firmware | 1.2.0.19_en |
| Tenda | Fh1202 | - |
| Tenda | Ac10 Firmware | 1.0 |
| Tenda | Ac10 | - |
| Tenda | Ac1206 Firmware | 1.0 |
| Tenda | Ac1206 | - |
| Tenda | Ac7 Firmware | 1.0 |
| Tenda | Ac7 | - |
| Tenda | Ac5 Firmware | 1.0 |
| Tenda | Ac5 | - |
| Tenda | Ac9 Firmware | 3.0 |
| Tenda | Ac9 | - |
Related Weaknesses (CWE)
References
- https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.mdExploitThird Party Advisory
- https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.mdExploitThird Party Advisory
FAQ
What is CVE-2023-37717?
CVE-2023-37717 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fr...
How severe is CVE-2023-37717?
CVE-2023-37717 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-37717?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda F1202 Firmware, Tenda F1202, Tenda Fh1202 Firmware, Tenda Fh1202, Tenda Ac10 Firmware.