Vulnerability Description
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetStaticRouteCfg.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac9 Firmware | 5.03.06.42_multi |
| Tenda | Ac9 | 3.0 |
| Tenda | Ac5 Firmware | 15.03.06.28 |
| Tenda | Ac5 | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/peris-navince/founded-0-days/blob/main/fromSetRouteStatic/1.mExploitThird Party Advisory
- https://github.com/peris-navince/founded-0-days/blob/main/fromSetRouteStatic/1.mExploitThird Party Advisory
FAQ
What is CVE-2023-41553?
CVE-2023-41553 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetStaticRouteCfg.
How severe is CVE-2023-41553?
CVE-2023-41553 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-41553?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac9 Firmware, Tenda Ac9, Tenda Ac5 Firmware, Tenda Ac5.