Show filters
85 Total Results
Displaying 41-50 of 85
Sort by:
Attacker Value
Unknown
CVE-2023-39786
Disclosure Date: August 21, 2023 (last updated October 08, 2023)
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the time parameter in the sscanf function.
0
Attacker Value
Unknown
CVE-2023-39785
Disclosure Date: August 21, 2023 (last updated October 08, 2023)
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list parameter in the set_qosMib_list function.
0
Attacker Value
Unknown
CVE-2023-39784
Disclosure Date: August 21, 2023 (last updated October 08, 2023)
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list parameter in the save_virtualser_data function.
0
Attacker Value
Unknown
CVE-2023-38937
Disclosure Date: August 07, 2023 (last updated October 08, 2023)
Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, AC5 V1.0 V15.03.06.28, AC9 V3.0 V15.03.06.42_multi and AC10 v4.0 V16.03.10.13 were discovered to contain a stack overflow via the list parameter in the formSetVirtualSer function.
0
Attacker Value
Unknown
CVE-2023-38935
Disclosure Date: August 07, 2023 (last updated October 08, 2023)
Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function.
0
Attacker Value
Unknown
CVE-2023-38931
Disclosure Date: August 07, 2023 (last updated October 08, 2023)
Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and FH1203 V2.0.1.6 were discovered to contain a stack overflow via the list parameter in the setaccount function.
0
Attacker Value
Unknown
CVE-2023-35087
Disclosure Date: July 21, 2023 (last updated October 08, 2023)
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking validation for a specific value when calling cm_processChangedConfigMsg in ccm_processREQ_CHANGED_CONFIG function in AiMesh system. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.
0
Attacker Value
Unknown
CVE-2023-35086
Disclosure Date: July 21, 2023 (last updated March 27, 2024)
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.
0
Attacker Value
Unknown
CVE-2023-33675
Disclosure Date: June 02, 2023 (last updated October 08, 2023)
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the time parameter in the get_parentControl_list_Info function.
0
Attacker Value
Unknown
CVE-2023-33673
Disclosure Date: June 02, 2023 (last updated October 08, 2023)
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.
0