Tenda i9 1.0.0.8(3828) /goform/GetIPTV websReadEvent Kari na aiki

Hakika vulnerability da aka rarraba a matsayin kura an gano a Tenda i9 1.0.0.8(3828). Tabbas, aikin websReadEvent ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /goform/GetIPTV, a cikin sashi $software_component. Wuro manipulation ga Kari na aiki. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-476. Lalle, rauni an sanar da shi 11/24/2024. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2024-11650. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

2 Goyarwa · 85 Datenpunkte

FurɗeSúgá
11/24/2024 16:08
Gargadi 1/1
11/25/2024 06:45
software_vendorTendaTenda
software_namei9i9
software_version1.0.0.8(3828)1.0.0.8(3828)
software_file/goform/GetIPTV/goform/GetIPTV
software_functionwebsReadEventwebsReadEvent
vulnerability_cweCWE-476 (Kari na aiki)CWE-476 (Kari na aiki)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iNN
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/xiaobor123/tenda-vul-i9https://github.com/xiaobor123/tenda-vul-i9
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/xiaobor123/tenda-vul-i9https://github.com/xiaobor123/tenda-vul-i9
source_cveCVE-2024-11650CVE-2024-11650
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciNN
cvss2_vuldb_iiNN
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcNN
cvss4_vuldb_viNN
cvss4_vuldb_vaHH
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.86.8
cvss2_vuldb_tempscore5.85.8
cvss3_vuldb_basescore6.56.5
cvss3_vuldb_tempscore5.95.9
cvss3_meta_basescore6.56.5
cvss3_meta_tempscore5.96.2
cvss4_vuldb_bscore7.17.1
cvss4_vuldb_btscore5.75.7
advisory_date1732402800 (11/24/2024)1732402800 (11/24/2024)
price_0day$0-$5k$0-$5k
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciN
cvss2_cna_iiN
cvss2_cna_aiC
cvss2_cna_basescore6.8
cve_nvd_summaryA vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcN
cvss4_cna_viN
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore7.1
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aH
cvss3_cna_basescore6.5

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!