Vulnerability in Tenda routers' GetIPTV websReadEvent functio
Reporter | Title | Published | Views | Family All 3 |
---|---|---|---|---|
Cvelist | CVE-2024-10280 Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference | 23 Oct 202413:31 | – | cvelist |
NVD | CVE-2024-10280 | 23 Oct 202414:15 | – | nvd |
CVE | CVE-2024-10280 | 23 Oct 202414:15 | – | cve |
[
{
"cpes": [
"cpe:2.3:o:tenda:ac6_firmware:15.03.06.23:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac6_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.23"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac8_firmware",
"versions": [
{
"status": "affected",
"version": "16.03.34.06"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac8_firmware",
"versions": [
{
"status": "affected",
"version": "16.03.34.09"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac10_firmware",
"versions": [
{
"status": "affected",
"version": "16.03.48.23"
},
{
"status": "affected",
"version": "16.03.48.19"
},
{
"status": "affected",
"version": "16.03.48.20"
},
{
"status": "affected",
"version": "16.03.48.13"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac1206_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.23"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac9_firmware:*:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac9_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.42"
},
{
"status": "affected",
"version": "15.03.05.19\\(6318_\\)"
},
{
"status": "affected",
"version": "15.03.05.14"
},
{
"status": "affected",
"version": "15.03.2.13"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac18_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.05.05"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac18_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.05.19\\(6318\\)"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac500_firmware",
"versions": [
{
"status": "affected",
"version": "2.0.1.9\\(1307\\)"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac500_firmware:1.0.0.16:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac500_firmware",
"versions": [
{
"status": "affected",
"version": "1.0.0.16"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac500_firmware:1.0.0.14:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac500_firmware",
"versions": [
{
"status": "affected",
"version": "1.0.0.14"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac10u_firmware:15.03.06.48:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac10u_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.48"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac10u_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.49"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac7_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.06.44"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac15_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.05.18"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*"
],
"vendor": "tenda",
"product": "ac15_firmware",
"versions": [
{
"status": "affected",
"version": "15.03.05.19"
}
],
"defaultStatus": "unknown"
}
]
Source | Link |
---|---|
github | www.github.com/JohenanLi/router_vuls/blob/main/websReadEvent/websReadEvent.md |
vuldb | www.vuldb.com/ |
tenda | www.tenda.com.cn/ |
vuldb | www.vuldb.com/ |
vuldb | www.vuldb.com/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo