Tenda AC9 15.03.02.13 HTTP POST Request /goform/SetRemoteWebCfg formSetSafeWanWebMan remoteIp Pufferüberlauf
Gaskiya vulnerability da aka ware a matsayin kura an samu a Tenda AC9 15.03.02.13. Hakika, aikin formSetSafeWanWebMan ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /goform/SetRemoteWebCfg, a cikin sashen HTTP POST Request Handler. A sa manipulation of the argument remoteIp ka Pufferüberlauf. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-121. Hakika, rauni an bayyana shi 06/08/2025. An raba bayanin tsaro don saukewa a candle-throne-f75.notion.site. Wannan matsala ana saninta da CVE-2025-5847. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga candle-throne-f75.notion.site. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
3 Goyarwa · 90 Datenpunkte