cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-29680,https://securityvulnerability.io/vulnerability/CVE-2023-29680,Cleartext Transmission Vulnerability in Tenda N301 Router Firmware,"The Tenda N301 Router's firmware has a vulnerability that exposes sensitive information due to the use of cleartext transmission in cookie settings. This flaw enables an authenticated attacker on the local area network (LAN) or wireless local area network (WLAN) to intercept communications with the router, allowing them to capture the ecosystem password. Such exploitation can lead to unauthorized access to the router and connected devices, posing a significant security risk to users. It is essential for users to update their firmware to mitigate this vulnerability.",Tenda,N301 Firmware,5.7,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2023-29681,https://securityvulnerability.io/vulnerability/CVE-2023-29681,Cleartext Transmission Vulnerability in Tenda N301 by Tenda,"The Tenda N301 router, specifically version 6.0 with firmware v12.03.01.06_pt, is susceptible to a cleartext transmission vulnerability. This flaw enables an authenticated local attacker to intercept vulnerable cookie communications on both LAN and WLAN. By exploiting this weakness, an attacker could gain unauthorized access to sensitive information, including the router's password, potentially compromising the security of the network. Users of this device are strongly advised to review security best practices and consider firmware updates to mitigate any associated risks.",Tenda,N301 Firmware,5.7,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2019-16412,https://securityvulnerability.io/vulnerability/CVE-2019-16412,Denial of Service Vulnerability in Tenda N301 Wireless Router,"A vulnerability in the Tenda N301 wireless router allows attackers to initiate a denial of service condition by sending a malformed request that sets the WAN MTU value to zero. This parameter is only restricted through the device's graphical user interface, thus enabling an exploit via command injection. If the attacker successfully triggers this exploit, it results in the router crashing, disrupting network access for legitimate users.",Tenda,N301 Firmware,7.5,HIGH,0.0012499999720603228,false,,false,false,false,,,false,false,,2019-09-19T15:14:34.000Z,0 CVE-2019-16288,https://securityvulnerability.io/vulnerability/CVE-2019-16288,Buffer Overflow in Tenda N301 Wireless Router,"A buffer overflow vulnerability exists in the Tenda N301 wireless router that can be triggered by a specially crafted long string in the 'wifiSSID' parameter of a goform/setWifi POST request. Exploiting this vulnerability can lead to unexpected crashes of the router, impacting network stability and usability.",Tenda,N301 Firmware,7.5,HIGH,0.0009500000160187483,false,,false,false,false,,,false,false,,2019-09-13T15:00:30.000Z,0