Vulnerability Description
Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter firewallEn at url /goform/SetFirewallCfg.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac9 Firmware | 15.03.06.42_multi |
| Tenda | Ac9 | 3.0 |
Related Weaknesses (CWE)
References
- https://github.com/peris-navince/founded-0-days/blob/main/formSetFirewallCfg/1.mExploitThird Party Advisory
- https://github.com/peris-navince/founded-0-days/blob/main/formSetFirewallCfg/1.mExploitThird Party Advisory
FAQ
What is CVE-2023-41560?
CVE-2023-41560 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter firewallEn at url /goform/SetFirewallCfg.
How severe is CVE-2023-41560?
CVE-2023-41560 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-41560?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac9 Firmware, Tenda Ac9.