Metrics
Affected Vendors & Products
Wed, 30 Jul 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda i24 Tenda i24 Firmware Tenda w12 Tenda w12 Firmware |
|
| CPEs | cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:* cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i24_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:* cpe:2.3:o:tenda:i24_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:* cpe:2.3:o:tenda:w12_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:* cpe:2.3:o:tenda:w12_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda i24 Tenda i24 Firmware Tenda w12 Tenda w12 Firmware |
Mon, 21 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 19 Apr 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644) and classified as critical. Affected by this issue is the function cgiSysUplinkCheckSet of the file /bin/httpd. The manipulation of the argument hostIp1/hostIp2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda W12/i24 httpd cgiSysUplinkCheckSet stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-04-19T20:31:06.957Z
Updated: 2025-04-21T14:41:40.160Z
Reserved: 2025-04-18T23:55:24.153Z
Link: CVE-2025-3820
Updated: 2025-04-21T14:41:19.586Z
Status : Analyzed
Published: 2025-04-19T21:15:45.660
Modified: 2025-07-30T18:57:54.207
Link: CVE-2025-3820
No data.