Vulnerability Description
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac10V4 Firmware | 16.03.10.13 |
| Tenda | Ac10V4 | - |
Related Weaknesses (CWE)
References
- https://github.com/peris-navince/founded-0-days/blob/main/ac10/SetIpMacBind/1.mdExploitThird Party Advisory
- https://github.com/peris-navince/founded-0-days/blob/main/ac10/SetIpMacBind/1.mdExploitThird Party Advisory
FAQ
What is CVE-2023-40902?
CVE-2023-40902 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.
How severe is CVE-2023-40902?
CVE-2023-40902 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-40902?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac10V4 Firmware, Tenda Ac10V4.