Vulnerability Description
A vulnerability has been found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this vulnerability is the function formWriteFacMac of the file /goform/WriteFacMac of the component API Endpoint. The manipulation of the argument mac leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac6 Firmware | 15.03.05.19 |
| Tenda | Ac6 | - |
Related Weaknesses (CWE)
References
- https://github.com/theRaz0r/iot-mycve/blob/main/tenda_ac6_rce_WriteFacMac/tenda_ExploitThird Party Advisory
- https://vuldb.com/?ctiid.282865Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.282865Permissions RequiredThird Party Advisory
- https://vuldb.com/?submit.434934Third Party Advisory
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2024-10697?
CVE-2024-10697 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability has been found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this vulnerability is the function formWriteFacMac of the file /goform/WriteFacMac of the component API ...
How severe is CVE-2024-10697?
CVE-2024-10697 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10697?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac6 Firmware, Tenda Ac6.