Tenda i9 1.0.0.8(3828) /goform/GetIPTV websReadEvent Kari na aiki
Hakika vulnerability da aka rarraba a matsayin kura an gano a Tenda i9 1.0.0.8(3828). Tabbas, aikin websReadEvent ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /goform/GetIPTV, a cikin sashi $software_component. Wuro manipulation ga Kari na aiki. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-476. Lalle, rauni an sanar da shi 11/24/2024. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2024-11650. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
2 Goyarwa · 85 Datenpunkte
| Furɗe | Súgá 11/24/2024 16:08 | Gargadi 1/1 11/25/2024 06:45 |
|---|---|---|
| software_vendor | Tenda | Tenda |
| software_name | i9 | i9 |
| software_version | 1.0.0.8(3828) | 1.0.0.8(3828) |
| software_file | /goform/GetIPTV | /goform/GetIPTV |
| software_function | websReadEvent | websReadEvent |
| vulnerability_cwe | CWE-476 (Kari na aiki) | CWE-476 (Kari na aiki) |
| vulnerability_risk | 2 | 2 |
| cvss3_vuldb_av | N | N |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | N | N |
| cvss3_vuldb_i | N | N |
| cvss3_vuldb_a | H | H |
| cvss3_vuldb_e | P | P |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/xiaobor123/tenda-vul-i9 | https://github.com/xiaobor123/tenda-vul-i9 |
| exploit_availability | 1 | 1 |
| exploit_publicity | 1 | 1 |
| exploit_url | https://github.com/xiaobor123/tenda-vul-i9 | https://github.com/xiaobor123/tenda-vul-i9 |
| source_cve | CVE-2024-11650 | CVE-2024-11650 |
| cna_responsible | VulDB | VulDB |
| cvss2_vuldb_av | N | N |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_ci | N | N |
| cvss2_vuldb_ii | N | N |
| cvss2_vuldb_ai | C | C |
| cvss2_vuldb_e | POC | POC |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | N | N |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | N | N |
| cvss4_vuldb_vi | N | N |
| cvss4_vuldb_va | H | H |
| cvss4_vuldb_e | P | P |
| cvss2_vuldb_au | S | S |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_pr | L | L |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_pr | L | L |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss2_vuldb_basescore | 6.8 | 6.8 |
| cvss2_vuldb_tempscore | 5.8 | 5.8 |
| cvss3_vuldb_basescore | 6.5 | 6.5 |
| cvss3_vuldb_tempscore | 5.9 | 5.9 |
| cvss3_meta_basescore | 6.5 | 6.5 |
| cvss3_meta_tempscore | 5.9 | 6.2 |
| cvss4_vuldb_bscore | 7.1 | 7.1 |
| cvss4_vuldb_btscore | 5.7 | 5.7 |
| advisory_date | 1732402800 (11/24/2024) | 1732402800 (11/24/2024) |
| price_0day | $0-$5k | $0-$5k |
| cvss2_cna_av | N | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | S | |
| cvss2_cna_ci | N | |
| cvss2_cna_ii | N | |
| cvss2_cna_ai | C | |
| cvss2_cna_basescore | 6.8 | |
| cve_nvd_summary | A vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| cvss4_cna_av | N | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | L | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | N | |
| cvss4_cna_vi | N | |
| cvss4_cna_va | H | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 7.1 | |
| cvss3_cna_av | N | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | L | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | N | |
| cvss3_cna_i | N | |
| cvss3_cna_a | H | |
| cvss3_cna_basescore | 6.5 |