cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-4243,https://securityvulnerability.io/vulnerability/CVE-2024-4243,Stack-based Buffer Overflow Vulnerability in Tenda W9 WiFi Router,"The Tenda W9 WiFi router version 1.0.0.7 contains a stack-based buffer overflow vulnerability in the formwrlSSIDset function, located in the /goform/wifiSSIDset file. By manipulating the ssidIndex argument, an attacker can exploit this vulnerability remotely, allowing unauthorized access to critical system resources. This vulnerability has been publicly disclosed, increasing the risk of potential exploitation. The vendor, Tenda, has been notified about this issue, but there has been no response or acknowledgment. Users are strongly advised to take immediate action to safeguard their systems until a patch can be provided.",Tenda,W9 Firmware,8.8,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-04-26T22:15:00.000Z,0 CVE-2024-4244,https://securityvulnerability.io/vulnerability/CVE-2024-4244,Remote Stack-Based Buffer Overflow in Tenda W9 Router,"A critical vulnerability has been identified in the Tenda W9 router, specifically in the function fromDhcpSetSer within the /goform/DhcpSetSer file. This issue allows an attacker to exploit a stack-based buffer overflow by manipulating DHCP-related arguments, including dhcpStartIp, dhcpEndIp, dhcpGw, dhcpMask, dhcpLeaseTime, dhcpDns1, and dhcpDns2. The vulnerability can be exploited remotely, making it particularly dangerous. Publicly disclosed and unaddressed by the vendor, it raises serious security concerns for users of the affected version 1.0.0.7 (4456). Immediate action is recommended to mitigate potential risks.",Tenda,W9 Firmware,8.8,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-04-26T22:15:00.000Z,0 CVE-2024-4240,https://securityvulnerability.io/vulnerability/CVE-2024-4240,Stack-based Buffer Overflow Vulnerability in Tenda W9,"A remote exploitable vulnerability has been discovered in the Tenda W9 router, specifically in the formQosManageDouble_user function. The flaw arises from improper handling of the ssidIndex argument, which can lead to a stack-based buffer overflow, allowing an attacker to execute arbitrary code. This vulnerability highlights potential security weaknesses in IoT devices, urging users to implement necessary security measures to safeguard their networks.",Tenda,W9 Firmware,8.8,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-04-26T21:15:00.000Z,0 CVE-2024-4241,https://securityvulnerability.io/vulnerability/CVE-2024-4241,Buffer Overflow Vulnerability in Tenda W9 Router,"A significant security flaw has been identified in the Tenda W9 router, specifically affecting version 1.0.0.7(4456). This vulnerability is characterized by a stack-based buffer overflow in the function formQosManageDouble_auto. When the ssidIndex argument is manipulated, it opens the door for remote attackers to execute potentially harmful code, compromising the router's integrity and the network it supports. It is important to note that despite earlier notifications, Tenda has not responded to this disclosure, highlighting a pressing need for users to remain vigilant and apply appropriate security measures.",Tenda,W9 Firmware,8.8,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-04-26T21:15:00.000Z,0 CVE-2024-4242,https://securityvulnerability.io/vulnerability/CVE-2024-4242,Stack-Based Buffer Overflow in Tenda W9 Router,"A serious vulnerability has been identified in the Tenda W9 router, specifically in the function formwrlSSIDget within the file /goform/wifiSSIDget. This vulnerability arises from improper handling of the ssidIndex argument, leading to a stack-based buffer overflow. Remote attackers could exploit this weakness to execute arbitrary code on the device, potentially compromising the network. The exploit was publicly disclosed, indicating that it may be actively targeted by cybercriminals. Users of affected Tenda W9 routers are advised to apply security measures and stay informed about any patches or updates from Tenda.",Tenda,W9 Firmware,8.8,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-04-26T21:15:00.000Z,0