cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-48194,https://securityvulnerability.io/vulnerability/CVE-2023-48194,Buffer Overflow Vulnerability in Tenda AC8v4 Router,"A newly identified vulnerability in the Tenda AC8v4 router arises from improper handling of input via the sscanf function, which causes buffer overflow issues. Specifically, during the execution of set_client_qos, the last digit of an internal variable is erroneously overwritten with a null byte. This exploitation can lead to unauthorized control over the gp register, allowing potential intruders to manipulate router functionality. Users of the Tenda AC8v4 are advised to assess their security measures and seek updates from the vendor.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.000699999975040555,false,,false,false,false,,,false,false,,2024-07-09T18:15:00.000Z,0 CVE-2023-40896,https://securityvulnerability.io/vulnerability/CVE-2023-40896,Stack Overflow Vulnerability in Tenda AC8 Router by Tenda,"The Tenda AC8 Router has a vulnerability that allows for stack overflow via the 'parameter list' and 'bindnum' during the '/goform/SetIpMacBind' process. This flaw can potentially enable unauthorized access or execution of arbitrary code, jeopardizing the security of the router and connected devices.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40900,https://securityvulnerability.io/vulnerability/CVE-2023-40900,Stack Overflow Vulnerability in Tenda AC8 Router,"A stack overflow vulnerability has been identified in the Tenda AC8 router, specifically in the firmware version US_AC8V4.0si_V16.03.34.06_cn. This issue arises from improper handling of input parameters at the endpoint /goform/SetNetControlList, potentially allowing attackers to exploit the overflow for unauthorized access or control over the router's operations.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40898,https://securityvulnerability.io/vulnerability/CVE-2023-40898,Stack Overflow Vulnerability in Tenda AC8 Router,"The Tenda AC8 Router has been found to be susceptible to a stack overflow vulnerability through the 'timeZone' parameter in the SetSysTimeCfg endpoint. This flaw could potentially allow an attacker to manipulate the router's operation, leading to unauthorized access or service disruption. It is crucial for users to understand the implications of this vulnerability and take necessary steps to secure their devices.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40899,https://securityvulnerability.io/vulnerability/CVE-2023-40899,Stack Overflow Vulnerability in Tenda AC8 Router,"The Tenda AC8 router has been identified to contain a stack overflow vulnerability that arises from improper handling of the macFilterType and deviceList parameters at the /goform/setMacFilterCfg endpoint. This issue may allow an attacker to manipulate device configurations, potentially leading to unauthorized access and exploitation of the device's functionalities. Users of the affected firmware version are encouraged to assess their configurations and apply relevant mitigations to enhance their device security.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40895,https://securityvulnerability.io/vulnerability/CVE-2023-40895,Stack Overflow Vulnerability in Tenda AC8 Router,"The Tenda AC8 Router is susceptible to a stack overflow vulnerability triggered by improper handling of input parameters in the /goform/SetVirtualServerCfg endpoint. This flaw may allow attackers to manipulate the stack and execute arbitrary code, potentially compromising network integrity and security. Users are strongly urged to apply mitigations and updates to safeguard their devices from potential exploits.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40891,https://securityvulnerability.io/vulnerability/CVE-2023-40891,Stack Overflow in Tenda AC8 Firewall Configuration,"A stack overflow vulnerability has been identified in the Tenda AC8 router, specifically within the firewall configuration endpoint. The flaw, located in the '/goform/SetFirewallCfg' parameter named 'firewallEn', could allow attackers to manipulate the stack through crafted requests. This vulnerability poses a significant risk to users, potentially leading to unauthorized access and disruption of network security measures.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40892,https://securityvulnerability.io/vulnerability/CVE-2023-40892,Stack Overflow Vulnerability in Tenda AC8 Router,"A stack overflow vulnerability has been identified in the Tenda AC8 Router. This issue arises from improper handling of parameters 'schedStartTime' and 'schedEndTime' in the '/goform/openSchedWifi' endpoint. Attackers may exploit this vulnerability to execute arbitrary code or potentially crash the device, compromising the integrity and security of the network.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40893,https://securityvulnerability.io/vulnerability/CVE-2023-40893,Stack Overflow Vulnerability in Tenda AC8 Router,"A stack overflow vulnerability has been identified in the Tenda AC8 router, specifically in the firmware version v4 US_AC8V4.0si_V16.03.34.06_cn. This issue occurs in the 'PowerSaveSet' function, where improper handling of the 'time' parameter can lead to stack overflow conditions. Exploiting this vulnerability may allow an attacker to manipulate memory and execute arbitrary code, compromising the integrity and functionality of the router.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40894,https://securityvulnerability.io/vulnerability/CVE-2023-40894,Stack Overflow Vulnerability in Tenda AC8 Router Firmware,"A vulnerability has been identified in the Tenda AC8 v4 router, particularly in the firmware version US_AC8V4.0si_V16.03.34.06_cn. The issue arises from a stack overflow that can occur when handling parameters at the '/goform/SetStaticRouteCfg' endpoint. This could potentially allow remote attackers to execute arbitrary code or disrupt the service, posing a significant risk to users' network security.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-40897,https://securityvulnerability.io/vulnerability/CVE-2023-40897,Stack Overflow Vulnerability in Tenda AC8 Router by Tenda,"The Tenda AC8 router has been identified to possess a stack overflow vulnerability that can be triggered via the 'mac' parameter in the 'GetParentControlInfo' function. This flaw could potentially allow attackers to execute arbitrary code, compromising the device's functionality and the security of the network it supports. Proper patching and protective measures are essential to safeguard users from potential exploits linked to this vulnerability.",Tenda,Ac8v4 Firmware,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2023-08-24T00:00:00.000Z,0 CVE-2023-39784,https://securityvulnerability.io/vulnerability/CVE-2023-39784,Stack Overflow Vulnerability in Tenda AC8 Router Firmware,"A stack overflow vulnerability has been identified in the Tenda AC8 router firmware version V16.03.34.06. Specifically, it arises from improper handling of the list parameter within the save_virtualser_data function, potentially enabling an attacker to exploit the overflow. This could lead to arbitrary code execution or system crashes. Users of Tenda AC8 routers are urged to review their firmware and implement the latest security patches to mitigate the risk associated with this vulnerability.",Tenda,Ac8v4 Firmware,7.5,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2023-08-21T01:15:00.000Z,0 CVE-2023-39785,https://securityvulnerability.io/vulnerability/CVE-2023-39785,Stack Overflow Vulnerability in Tenda AC8 Router,"The Tenda AC8 Router, specifically version V16.03.34.06, has been identified with a stack overflow vulnerability. This issue arises from improper handling of user input via the 'list' parameter in the set_qosMib_list function. Successful exploitation of this vulnerability could lead to adverse effects on the router's functionality, potentially exposing network devices to unauthorized access or disruption. Users are encouraged to review security practices and apply necessary updates to mitigate this risk.",Tenda,Ac8v4 Firmware,7.5,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2023-08-21T01:15:00.000Z,0 CVE-2023-39786,https://securityvulnerability.io/vulnerability/CVE-2023-39786,Stack Overflow Vulnerability in Tenda AC8 Router,"The Tenda AC8 router has been found to have a stack overflow vulnerability that is triggered by the time parameter in the sscanf function. This flaw could potentially allow attackers to exploit the device, leading to unauthorized access and compromising the integrity of the router's operations. As IoT devices become more prevalent, ensuring the security of products like the Tenda AC8 is crucial for maintaining network security and protecting sensitive information.",Tenda,Ac8v4 Firmware,7.5,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2023-08-21T01:15:00.000Z,0