cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-46049,https://securityvulnerability.io/vulnerability/CVE-2024-46049,Stack Overflow Vulnerability in Tenda O6 V3.0 Firmware,"The Tenda O6 V3.0 firmware version V1.0.0.7(2054) is affected by a stack overflow vulnerability located in the formexeCommand function. This security flaw arises due to improper handling of input parameters, which may allow an attacker to exploit the system. Successful exploitation could potentially lead to unauthorized access, data breaches, or a complete system compromise, posing significant risks to the integrity and confidentiality of the affected devices.",Tenda,O6 Firmware,9.8,CRITICAL,0.0012100000167265534,false,false,false,false,,false,false,2024-09-13T00:00:00.000Z,0 CVE-2024-8231,https://securityvulnerability.io/vulnerability/CVE-2024-8231,Remote Stack-Based Buffer Overflow in Tenda O6 Router,"A serious stack-based buffer overflow vulnerability has been identified in Tenda O6 routers, specifically affecting the function 'fromVirtualSet' in the '/goform/setPortForward' configuration file. The vulnerability occurs due to improper handling of the 'ip', 'localPort', 'publicPort', and 'app' arguments. This oversight can be exploited remotely, allowing attackers to manipulate input parameters and execute arbitrary code on the device. The potential impact includes unauthorized access to network resources and various cybersecurity risks. Ignoring this issue poses significant threats to users relying on these devices for secure connectivity.",Tenda,O6,8.8,HIGH,0.0008999999845400453,false,false,false,true,true,false,false,2024-08-28T01:00:09.903Z,0 CVE-2024-8230,https://securityvulnerability.io/vulnerability/CVE-2024-8230,Stack-Based Buffer Overflow in Tenda O6 Wi-Fi Extender,"A significant security vulnerability has been identified in the Tenda O6 Wi-Fi extender, specifically in version 1.0.0.7 (2054). This flaw resides in the 'fromSafeSetMacFilter' function, enabling a stack-based buffer overflow when the arguments related to remark, type, or time are manipulated. The exploit can be carried out remotely, posing a considerable risk to users' network security. Despite notifications regarding this vulnerability, Tenda has yet to respond. It is crucial for users of the affected product to apply necessary updates and consider additional security measures to protect their networks from potential attacks.",Tenda,O6,9.8,CRITICAL,0.003530000103637576,false,false,false,true,true,false,false,2024-08-28T01:00:07.395Z,0 CVE-2024-8229,https://securityvulnerability.io/vulnerability/CVE-2024-8229,$title,"A vulnerability exists in the Tenda O6 product due to improper handling of the 'mac' argument in the frommacFilterModify function located in the /goform/operateMacFilter file. This issue can result in a stack-based buffer overflow, enabling remote attackers to potentially execute arbitrary code on affected devices. The exploit has been publicly disclosed, and the vendor has not responded to initial communications regarding this security concern.",Tenda,O6,9.8,CRITICAL,0.003530000103637576,false,false,false,true,true,false,false,2024-08-28T00:31:05.407Z,0