cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-8226,https://securityvulnerability.io/vulnerability/CVE-2024-8226,Remote Stack-Based Buffer Overflow in Tenda O1,"A critical security vulnerability exists in the Tenda O1 model, specifically within the function formSetCfm located at /goform/setcfm. This flaw stems from improper handling of the funcpara1 argument, leading to a stack-based buffer overflow. Attackers can exploit this vulnerability remotely, potentially allowing them to execute arbitrary code and compromise the system without authentication. The vulnerability has been publicly disclosed, yet Tenda has not responded to inquiries regarding remediation. Users of Tenda O1 with version 1.0.0.7(10648) are strongly advised to implement immediate security measures to mitigate risks associated with this critical flaw.",Tenda,O1 Firmware,9.8,CRITICAL,0.003530000103637576,false,,false,false,false,,,false,false,,2024-08-28T00:15:00.000Z,0 CVE-2024-8227,https://securityvulnerability.io/vulnerability/CVE-2024-8227,Tenda O1 Vulnerability: Stack-Based Buffer Overflow Threat Remotely Exploitable,"A stack-based buffer overflow has been identified in Tenda O1 version 1.0.0.7(10648). The vulnerability arises in the function fromDhcpSetSer located in the /goform/DhcpSetSer file. Attackers can exploit this flaw by manipulating the arguments associated with DHCP configuration, including dhcpStartIp, dhcpEndIp, dhcpGw, dhcpMask, dhcpLeaseTime, dhcpDns1, and dhcpDns2. The exploit is remotely accessible, allowing potential attackers to initiate an attack from a distance. Despite early disclosure to the vendor, there has been no response regarding mitigation or patching efforts, increasing the urgency for users to secure their systems against potential exploits.",Tenda,O1 Firmware,9.8,CRITICAL,0.003530000103637576,false,,false,false,false,,,false,false,,2024-08-28T00:15:00.000Z,0