cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-45499,https://securityvulnerability.io/vulnerability/CVE-2022-45499,Stack Overflow Vulnerability in Tenda W6-S Router,"A stack overflow vulnerability exists in the Tenda W6-S router, specifically found in the configuration endpoint at /goform/WifiMacFilterGet. The issue is triggered by improper handling of the wl_radio parameter, which could allow an attacker to exploit the vulnerability, potentially leading to unauthorized access or disruption of device functionality. Users of this router model should take immediate precautions to secure their devices and apply any available patches.",Tenda,W6-s Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-45498,https://securityvulnerability.io/vulnerability/CVE-2022-45498,Unauthenticated Device Reboot Vulnerability in Tenda W6-S Router,"A vulnerability has been identified in the Tenda W6-S router that permits unauthenticated attackers to trigger arbitrary reboots of the device through the SysToolReboot parameter in the tpi_systool_handle function. This flaw can be exploited without any authentication, posing significant risks to network stability and security.",Tenda,W6-s Firmware,7.5,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-45497,https://securityvulnerability.io/vulnerability/CVE-2022-45497,Command Injection Vulnerability in Tenda W6-S by Tenda,"The Tenda W6-S v1.0.0.4(510) is susceptible to a command injection vulnerability in the tpi_get_ping_output function located at /goform/exeCommand. This flaw can allow attackers to execute arbitrary commands on the affected device, potentially compromising the functionality and security of the network environment.",Tenda,W6-s Firmware,9.8,CRITICAL,0.006370000075548887,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-45501,https://securityvulnerability.io/vulnerability/CVE-2022-45501,Stack Overflow Vulnerability in Tenda W6-S Router,"The Tenda W6-S Router is susceptible to a stack overflow vulnerability due to improper input validation in the 'wl_radio' parameter at the '/goform/wifiSSIDset' endpoint. This weakness could allow remote attackers to exploit the device by sending crafted requests, potentially leading to unauthorized access or disruption of service. It is crucial for users to apply security best practices and check for firmware updates to mitigate this risk.",Tenda,W6-s Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-45503,https://securityvulnerability.io/vulnerability/CVE-2022-45503,Stack Overflow Vulnerability in Tenda W6-S Router,"A stack overflow vulnerability has been identified in the Tenda W6-S router, specifically in version v1.0.0.4(510). An attacker can exploit this vulnerability through improperly validated input to the linkEn parameter at the /goform/setAutoPing endpoint, potentially leading to arbitrary code execution and unauthorized access. Users are recommended to consider patching or updating their devices to mitigate risks associated with this vulnerability.",Tenda,W6-s Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-45504,https://securityvulnerability.io/vulnerability/CVE-2022-45504,Unauthorized Device Reboot in Tenda W6-S by Tenda,"A security issue in the Tenda W6-S device's tpi_systool_handle(0) component allows unauthorized users to trigger arbitrary reboots of the device through the /goform/SysToolRestoreSet endpoint. This vulnerability can be exploited without authentication, posing a significant risk to device availability and integrity.",Tenda,W6-s Firmware,7.5,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2022-12-08T00:00:00.000Z,0 CVE-2022-35560,https://securityvulnerability.io/vulnerability/CVE-2022-35560,Stack Overflow Vulnerability in Tenda W6 Router,"A stack overflow vulnerability has been identified in the Tenda W6 router within the /goform/wifiSSIDset function. This flaw allows attackers to exploit the index parameter, potentially leading to a denial of service (DoS). Users of the affected version, Tenda W6 V1.0.0.9, should prioritize updates and review their security protocols to mitigate potential risks.",Tenda,W6 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0 CVE-2022-35558,https://securityvulnerability.io/vulnerability/CVE-2022-35558,Stack Overflow Vulnerability in Tenda W6 Wi-Fi Router,"A stack overflow vulnerability has been identified in the Tenda W6 router, specifically affecting the functionality in the /goform/WifiMacFilterGet component. This vulnerability allows attackers to exploit the index parameter, potentially leading to a denial of service (DoS) condition. By manipulating the input to this endpoint, adversaries could overload the system, rendering the router unresponsive, which poses a significant risk to users relying on this device for secure network connectivity.",Tenda,W6 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0 CVE-2022-35559,https://securityvulnerability.io/vulnerability/CVE-2022-35559,Stack Overflow Vulnerability in Tenda W6 Router,"A stack overflow vulnerability in the Tenda W6 router can be triggered through the /goform/setAutoPing endpoint. By crafting specific ping1 and ping2 parameters, an attacker can exploit this vulnerability, leading to potential arbitrary code execution. This flaw underscores the importance of securing IoT devices against sophisticated attacks that leverage coding errors.",Tenda,W6 Firmware,9.8,CRITICAL,0.002630000002682209,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0 CVE-2022-35557,https://securityvulnerability.io/vulnerability/CVE-2022-35557,Stack Overflow Vulnerability in Tenda W6 Router,"A stack overflow vulnerability has been identified in the Tenda W6 router, specifically in the /goform/wifiSSIDget functionality. This flaw can be exploited using the index parameter, allowing attackers to execute a denial of service (DoS) attack, disrupting network connectivity and service functionality. Users of affected versions are advised to assess their systems and implement necessary safeguards to mitigate this risk.",Tenda,W6 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0 CVE-2022-35555,https://securityvulnerability.io/vulnerability/CVE-2022-35555,Command Injection Vulnerability in Tenda W6 Router,"A command injection vulnerability has been identified in the Tenda W6 router, specifically in the /goform/exeCommand interface. This flaw allows attackers to exploit the cmdinput parameters, enabling them to execute arbitrary commands on the system. Such vulnerabilities pose serious risks, as they can lead to unauthorized access and potential compromise of the device and network.",Tenda,W6 Firmware,9.8,CRITICAL,0.0030499999411404133,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0 CVE-2022-35561,https://securityvulnerability.io/vulnerability/CVE-2022-35561,Stack Overflow Vulnerability in Tenda W6 WiFi Mac Filter,"A stack overflow vulnerability exists in the WiFi Mac Filter set functionality of the Tenda W6 (version V1.0.0.9(4122)). Attackers can exploit this vulnerability via the index parameter, potentially leading to a denial of service (DoS). This flaw highlights the importance of securing IoT devices against manipulation that can disrupt services.",Tenda,W6 Firmware,7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-08-12T15:15:00.000Z,0