Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-13391


An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.


Published

2020-05-22T17:15:11.177

Last Modified

2024-11-21T05:01:09.953

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-120

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System tendacn ac6_firmware v15.03.05.19_multi_td01 Yes
Hardware tendacn ac6 1.0 No
Operating System tendacn ac9_firmware v15.03.05.19\(6318\) Yes
Hardware tendacn ac9 1.0 No
Operating System tendacn ac15_firmware v15.03.05.19_multi_td01 Yes
Hardware tendacn ac15 1.0 No
Operating System tendacn ac18_firmware v15.03.05.19\(6318\) Yes
Hardware tendacn ac18 - No
Operating System tendacn ac9_firmware v15.03.06.42_multi Yes
Hardware tendacn ac9 3.0 No

References