cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-10351,https://securityvulnerability.io/vulnerability/CVE-2024-10351,Tenda RX9 Pro Vulnerability: Stack-Based Buffer Overflow Threat,"A security vulnerability has been identified in the Tenda RX9 Pro router, specifically within the function sub_424CE0 of the component responsible for handling POST requests. The issue arises from improper handling of the 'deviceList' argument within the MAC filter configuration. This manipulation can lead to a stack-based buffer overflow, potentially allowing an attacker to execute arbitrary code remotely. With the exploit now publicly disclosed, users are advised to take immediate action and apply necessary security measures to safeguard their devices.",Tenda,Rx9 Pro,8.8,HIGH,0.0008999999845400453,false,false,false,true,true,false,false,2024-10-25T00:15:00.000Z,0 CVE-2024-10282,https://securityvulnerability.io/vulnerability/CVE-2024-10282,Stack-based Buffer Overflow Vulnerability in Tenda RX9 and RX9 Pro,"A vulnerability in Tenda RX9 and RX9 Pro router firmware versions 22.03.02.10 and 22.03.02.20 allows for a stack-based buffer overflow via the function sub_42EA38 in /goform/SetVirtualServerCfg. This vulnerability can be exploited remotely, leading to potential unauthorized access and execution of arbitrary code. The implications of this flaw are significant as it poses risks for sensitive data exposure and can destabilize network integrity. Public disclosure of the exploit has heightened concerns, emphasizing the need for immediate action to safeguard affected devices.",Tenda,Rx9 Pro Firmware,8.8,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-23T15:15:00.000Z,0 CVE-2024-10283,https://securityvulnerability.io/vulnerability/CVE-2024-10283,Stack-Based Buffer Overflow in Tenda RX9 and RX9 Pro Products,"A stack-based buffer overflow vulnerability has been identified in the function sub_4337EC located in the SetNetControlList interface of Tenda RX9 and RX9 Pro routers, specifically in firmware version 22.03.02.20. This vulnerability can be exploited remotely, allowing an attacker to manipulate input arguments to facilitate unauthorized access or further exploitation. The exploit has been made public, raising concerns for users of these devices. It is critical for users to apply security patches or mitigate risks to protect their networks from potential attacks.",Tenda,Rx9 Pro Firmware,8.8,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-23T15:15:00.000Z,0 CVE-2024-10281,https://securityvulnerability.io/vulnerability/CVE-2024-10281,Stack-based Buffer Overflow Vulnerability in Tenda RX9 and RX9 Pro Products,"A stack-based buffer overflow vulnerability affects the Tenda RX9 and RX9 Pro devices, specifically within the SetStaticRouteCfg function located in the /goform/ directory. The flaw allows for remote manipulation of the argument list, leading to potential exploitation of the device. Attackers could exploit this vulnerability to execute arbitrary code, resulting in compromised device security. The public disclosure of the exploit raises concerns over the safety of devices running vulnerable firmware versions, specifically 22.03.02.10 and 22.03.02.20. It is crucial for users of Tenda RX9 and RX9 Pro to assess their firmware and implement necessary security patches to mitigate risks.",Tenda,Rx9 Pro Firmware,8.8,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2024-10-23T14:15:00.000Z,0 CVE-2023-43886,https://securityvulnerability.io/vulnerability/CVE-2023-43886,,A buffer overflow in the HTTP server component of Tenda RX9 Pro v22.03.02.20 might allow an authenticated attacker to overwrite memory.,Tenda,Rx9 Pro Firmware,7.1,HIGH,0.000539999979082495,false,false,false,false,,false,false,2023-11-07T00:00:00.000Z,0 CVE-2023-43885,https://securityvulnerability.io/vulnerability/CVE-2023-43885,,Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.,Tenda,Rx9 Pro Firmware,8.1,HIGH,0.0005600000149570405,false,false,false,false,,false,false,2023-11-07T00:00:00.000Z,0 CVE-2022-38829,https://securityvulnerability.io/vulnerability/CVE-2022-38829,,Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setMacFilterCfg.,Tenda,Rx9 Pro Firmware,9.8,CRITICAL,0.0020099999383091927,false,false,false,false,,false,false,2022-09-16T14:37:40.000Z,0 CVE-2022-38830,https://securityvulnerability.io/vulnerability/CVE-2022-38830,,Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setIPv6Status.,Tenda,Rx9 Pro Firmware,9.8,CRITICAL,0.0020099999383091927,false,false,false,false,,false,false,2022-09-16T14:36:48.000Z,0 CVE-2022-38831,https://securityvulnerability.io/vulnerability/CVE-2022-38831,,Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/SetNetControlList,Tenda,Rx9 Pro Firmware,9.8,CRITICAL,0.0020099999383091927,false,false,false,false,,false,false,2022-09-16T14:35:43.000Z,0