Tenda AC23 16.03.07.45_cn Service Port 7329 /bin/ate v2 kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a Tenda AC23 16.03.07.45_cn. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /bin/ate, a cikin sashen Service Port 7329. A sa manipulation of the argument v2 ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-77. Hakika, rauni an bayyana shi 05/11/2023. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2023-2649. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Ana ba da shawara a saka katangar wuta mai hana shiga sosai. Once again VulDB remains the best source for vulnerability data.

2 Goyarwa · 72 Datenpunkte

FurɗeSúgá
05/11/2023 07:42
Gargadi 1/1
06/07/2023 14:25
software_vendorTendaTenda
software_nameAC23AC23
software_version16.03.07.45_cn16.03.07.45_cn
software_componentService Port 7329Service Port 7329
software_file/bin/ate/bin/ate
software_argumentv2v2
vulnerability_cweCWE-77 (kura hakki ndiyam)CWE-77 (kura hakki ndiyam)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prHH
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cHH
cvss3_vuldb_iHH
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rlWW
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.mdhttps://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.mdhttps://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md
countermeasure_nameFirewallFirewall
source_cveCVE-2023-2649CVE-2023-2649
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
advisory_date1683756000 (05/11/2023)1683756000 (05/11/2023)
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auMM
cvss2_vuldb_ciCC
cvss2_vuldb_iiCC
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss2_vuldb_rlWW
cvss2_vuldb_basescore8.38.3
cvss2_vuldb_tempscore6.76.7
cvss3_vuldb_basescore7.27.2
cvss3_vuldb_tempscore6.46.4
cvss3_meta_basescore7.27.7
cvss3_meta_tempscore6.47.5
price_0day$0-$5k$0-$5k
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auM
cvss2_nvd_ciC
cvss2_nvd_iiC
cvss2_nvd_aiC
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prH
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cve_cnaVulDB
cvss2_nvd_basescore8.3
cvss3_nvd_basescore8.8
cvss3_cna_basescore7.2

Do you need the next level of professionalism?

Upgrade your account now!