Lucene search

K
cve[email protected]CVE-2024-2853
HistoryMar 24, 2024 - 5:15 a.m.

CVE-2024-2853

2024-03-2405:15:10
CWE-78
web.nvd.nist.gov
31
tenda ac10u
remote
os command injection
vulnerability
nvd
critical
public disclosure
exploit
vendor contact

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.2%

A vulnerability was found in Tenda AC10U 15.03.06.48/15.03.06.49. It has been rated as critical. This issue affects the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected configurations

Vulners
NVD
Node
tendaac10uMatch15.03.06.48
OR
tendaac10uMatch15.03.06.49
VendorProductVersionCPE
tendaac10u15.03.06.48cpe:2.3:h:tenda:ac10u:15.03.06.48:*:*:*:*:*:*:*
tendaac10u15.03.06.49cpe:2.3:h:tenda:ac10u:15.03.06.49:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Tenda",
    "product": "AC10U",
    "versions": [
      {
        "version": "15.03.06.48",
        "status": "affected"
      },
      {
        "version": "15.03.06.49",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.2%

Related for CVE-2024-2853