Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-4291", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2024-04-27T05:49:08.167Z", "datePublished": "2024-04-27T20:00:07.538Z", "dateUpdated": "2024-08-01T20:33:53.224Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2024-04-27T20:00:07.538Z"}, "title": "Tenda A301 setBlackRule formAddMacfilterRule stack-based overflow", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-121", "lang": "en", "description": "CWE-121 Stack-based Buffer Overflow"}]}], "affected": [{"vendor": "Tenda", "product": "A301", "versions": [{"version": "15.13.08.12_multi_TDE01", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as critical. This issue affects the function formAddMacfilterRule of the file /goform/setBlackRule. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262223. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."}, {"lang": "de", "value": "Eine Schwachstelle wurde in Tenda A301 15.13.08.12_multi_TDE01 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion formAddMacfilterRule der Datei /goform/setBlackRule. Mittels dem Manipulieren des Arguments deviceList mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."}], "metrics": [{"cvssV3_1": {"version": "3.1", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseSeverity": "HIGH"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseSeverity": "HIGH"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 9, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "timeline": [{"time": "2024-04-27T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2024-04-27T02:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2024-04-27T07:54:19.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "L1ziang (VulDB User)", "type": "reporter"}], "references": [{"url": "https://vuldb.com/?id.262223", "name": "VDB-262223 | Tenda A301 setBlackRule formAddMacfilterRule stack-based overflow", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.262223", "name": "VDB-262223 | CTI Indicators (IOB, IOC, IOA)", "tags": ["signature", "permissions-required"]}, {"url": "https://vuldb.com/?submit.320672", "name": "Submit #320672 | Tenda A301 v2.0 US_A301V2.0RTL_V15.13.08.12_multi_TDE01 Buffer Overflow", "tags": ["third-party-advisory"]}, {"url": "https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md", "tags": ["exploit"]}]}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"id": "CVE-2024-4291", "role": "CISA Coordinator", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-04-29T14:52:10.389752Z"}}}], "affected": [{"cpes": ["cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*"], "vendor": "tenda", "product": "ac15", "versions": [{"status": "affected", "version": "15.13.08.12_TDE01"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:54:19.682Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T20:33:53.224Z"}, "title": "CVE Program Container", "references": [{"url": "https://vuldb.com/?id.262223", "name": "VDB-262223 | Tenda A301 setBlackRule formAddMacfilterRule stack-based overflow", "tags": ["vdb-entry", "technical-description", "x_transferred"]}, {"url": "https://vuldb.com/?ctiid.262223", "name": "VDB-262223 | CTI Indicators (IOB, IOC, IOA)", "tags": ["signature", "permissions-required", "x_transferred"]}, {"url": "https://vuldb.com/?submit.320672", "name": "Submit #320672 | Tenda A301 v2.0 US_A301V2.0RTL_V15.13.08.12_multi_TDE01 Buffer Overflow", "tags": ["third-party-advisory", "x_transferred"]}, {"url": "https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md", "tags": ["exploit", "x_transferred"]}]}]}}