CVE-2024-10280
moderate-risk
Published 2024-10-23
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Ac10U Firmware
Ac10U Firmware
Ac500 Firmware
Ac500 Firmware
Ac500 Firmware
Affected Vendors
References (5)
Third Party Advisory
https://github.com/JohenanLi/router_vuls/blob/main/websReadEvent/websReadEvent.m...
Permissions Required
https://vuldb.com/?ctiid.281555
Third Party Advisory
https://vuldb.com/?id.281555
Third Party Advisory
https://vuldb.com/?submit.426417
Product
https://www.tenda.com.cn/
45
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
20/34 · Moderate