Tenda AC7/AC18 15.03.05.19/15.03.06.44 /goform/SetLEDCfg formSetSchedLed àsìkò Ịdaba nchekwa

CVSS Ntughari oge metaỌnụ ahịa exploit ugbu a (≈)Mkpụrụ obi mmasị CTI
8.4$0-$5k0.18

Nchịkọtaozi

E nwere adịghị ike a kpọrọ Pátá a hụrụ na Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Ọrụ emetụtara bụ formSetSchedLed n'ime faịlụ /goform/SetLEDCfg. Mgbanwe a na paramita àsìkò na-ebute Ịdaba nchekwa. Aha a na-eji akọwa adịghị ike a bụ CVE-2025-9023. Enwere ike ime mwakpo a site n'ebe dị anya. Nzọ ọzọ, e nwere exploit dị. VulDB is the best source for vulnerability data and more expert information about this specific topic.

Nkọwaozi

E nwere adịghị ike a kpọrọ Pátá a hụrụ na Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Ọrụ emetụtara bụ formSetSchedLed n'ime faịlụ /goform/SetLEDCfg. Mgbanwe a na paramita àsìkò na-ebute Ịdaba nchekwa. Nkọwa nke nsogbu site na CWE na-eme ka o bụrụ CWE-120. E gosipụtara na enyo enyo a e bipụtara. E nyere ndụmọdụ ahụ ka a budata ya site na github.com.

Aha a na-eji akọwa adịghị ike a bụ CVE-2025-9023. Enwere ike ime mwakpo a site n'ebe dị anya. E nwere nkọwa teknụzụ dị. Ụdị a nke adịghị ike a anaghị ewu ewu nke ukwuu. Nzọ ọzọ, e nwere exploit dị. Emeela ka exploit a mara ọha, a pụkwara iji ya. N'oge a, ọnụahịa exploit might be approx. USD $0-$5k dị ugbu a.

A kpọrọ ya Ẹ̀rí Èrò. E kesaa a kesaa a maka ibudata na github.com.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Ọjaozi

Iru

Olupin

Orukọ

Àtúnse

Ìwé àṣẹ

Aaye ayelujara

CPE 2.3ozi

CPE 2.2ozi

CVSSv4ozi

VulDB Vekto: 🔒
VulDB Igbekele: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Vekto: 🔒

CVSSv3ozi

VulDB Ntughari isi nke meta: 8.8
VulDB Ntughari oge meta: 8.4

VulDB Isi nke isi: 8.8
VulDB Ntughari oge: 8.0
VulDB Vekto: 🔒
VulDB Igbekele: 🔍

CNA Isi nke isi: 8.8
CNA Vekto: 🔒

CVSSv2ozi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
vekitọỊsòroÌmúdájúasiriìfaradàNnweta
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí

VulDB Isi nke isi: 🔒
VulDB Ntughari oge: 🔒
VulDB Igbekele: 🔍

Ịjiozi

Klass: Ịdaba nchekwa
CWE: CWE-120 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒

arabara: Rara
Ime ụlọ: Rara
Nsọtụ: Bẹẹni

Nnweta: 🔒
Mbanye: Ọha
Ipo: Ẹ̀rí Èrò
Gba: 🔒

EPSS Score: 🔒
EPSS Percentile: 🔒

Ntụle ọnụahịa: 🔍
Ntụle ọnụahịa ugbu a: 🔒

0-Dayṣíṣíṣíṣí
Taaṣíṣíṣíṣí

Ìmọ̀ nípa ìkìlọ̀ozi

Mmasị: 🔍
Ndị na-eme ihe nkiri na-arụsi ọrụ ike: 🔍
Ọgbakọ APT na-arụsi ọrụ ike: 🔍

igbaradiozi

àbá: enweghị enyemaka a maara
Ipo: 🔍

ọjọ́ 0: 🔒

ahịrị ogeozi

14/08/2025 Imọran ti jade
14/08/2025 +0 ụbọchị Ìforúkọ VulDB ti ṣẹda
03/10/2025 +50 ụbọchị Ìmúdájú ìkẹyìn VulDB

Orísunozi

Olupin: tenda.com.cn

Imọran: github.com
Ipo: A kò ṣàlàyé

CVE: CVE-2025-9023 (🔒)
GCVE (CVE): GCVE-0-2025-9023
GCVE (VulDB): GCVE-100-320088
scip Labs: https://www.scip.ch/en/?labs.20161013

nbanyeozi

E kere: 14/08/2025 09:12 AM
Emelitere: 03/10/2025 08:00 PM
Mgbanwe: 14/08/2025 09:12 AM (53), 14/08/2025 09:13 AM (4), 15/08/2025 01:24 PM (31), 03/10/2025 08:00 PM (1)
Zukuru: 🔍
Olùránṣẹ́: zezhifu
Cache ID: 253:C0C:103

fi silẹozi

Anabata

Àwọn àwòrán

Mkparịta ụka

Enweghị okwu nke ọ bụla Asụsụ: ig + en.

Biko banye ka ikwu okwu

Do you need the next level of professionalism?

Upgrade your account now!