Tenda i9 1.0.0.8(3828) /goform/GetIPTV websReadEvent ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Tenda i9 1.0.0.8(3828) keessatti argameera. Miidhamni argame is hojii websReadEvent faayilii /goform/GetIPTV keessa. Wanti jijjiirame gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-476 si geessa. Odeeffannoon kun yeroo 11/24/2024 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2024-11650 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

2 ଆଡାପ୍ଟେସନ୍ · 85 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
11/24/2024 04:08 PM
ଅଦ୍ୟତନ 1/1
11/25/2024 06:45 AM
software_vendorTendaTenda
software_namei9i9
software_version1.0.0.8(3828)1.0.0.8(3828)
software_file/goform/GetIPTV/goform/GetIPTV
software_functionwebsReadEventwebsReadEvent
vulnerability_cweCWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iNN
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/xiaobor123/tenda-vul-i9https://github.com/xiaobor123/tenda-vul-i9
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/xiaobor123/tenda-vul-i9https://github.com/xiaobor123/tenda-vul-i9
source_cveCVE-2024-11650CVE-2024-11650
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciNN
cvss2_vuldb_iiNN
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcNN
cvss4_vuldb_viNN
cvss4_vuldb_vaHH
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.86.8
cvss2_vuldb_tempscore5.85.8
cvss3_vuldb_basescore6.56.5
cvss3_vuldb_tempscore5.95.9
cvss3_meta_basescore6.56.5
cvss3_meta_tempscore5.96.2
cvss4_vuldb_bscore7.17.1
cvss4_vuldb_btscore5.75.7
advisory_date1732402800 (11/24/2024)1732402800 (11/24/2024)
price_0day$0-$5k$0-$5k
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciN
cvss2_cna_iiN
cvss2_cna_aiC
cvss2_cna_basescore6.8
cve_nvd_summaryA vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcN
cvss4_cna_viN
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore7.1
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aH
cvss3_cna_basescore6.5

Do you know our Splunk app?

Download it now for free!