Vulnerabilities > Tenda > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-16 | CVE-2024-57704 | Out-of-bounds Write vulnerability in Tenda AC8 Firmware 16.03.34.06 Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. | 8.8 |
2025-01-16 | CVE-2024-57578 | Out-of-bounds Write vulnerability in Tenda Ac18 Firmware 15.03.05.19 Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function. | 8.8 |
2024-11-25 | CVE-2024-11650 | NULL Pointer Dereference vulnerability in Tenda I9 Firmware 1.0.0.8(3828) A vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. | 7.5 |
2024-11-15 | CVE-2024-11248 | Unspecified vulnerability in Tenda Ac10 Firmware 16.03.10.13 A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. | 8.8 |
2024-11-11 | CVE-2024-11061 | Stack-based Buffer Overflow vulnerability in Tenda Ac10 Firmware 16.03.10.13 A vulnerability classified as critical was found in Tenda AC10 16.03.10.13. | 8.8 |
2024-11-10 | CVE-2024-11056 | Stack-based Buffer Overflow vulnerability in Tenda Ac10 Firmware 16.03.10.13 A vulnerability, which was classified as critical, was found in Tenda AC10 16.03.10.13. | 8.8 |
2024-11-01 | CVE-2024-10661 | Out-of-bounds Write vulnerability in Tenda Ac15 Firmware 15.03.05.19 A vulnerability has been found in Tenda AC15 15.03.05.19 and classified as critical. | 8.8 |
2024-11-01 | CVE-2024-10662 | Out-of-bounds Write vulnerability in Tenda Ac15 Firmware 15.03.05.19 A vulnerability was found in Tenda AC15 15.03.05.19 and classified as critical. | 8.8 |
2024-10-28 | CVE-2024-48825 | OS Command Injection vulnerability in Tenda AC7 Firmware 15.03.06.44 Tenda AC7 v.15.03.06.44 ate_ifconfig_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. | 8.8 |
2024-10-28 | CVE-2024-48826 | OS Command Injection vulnerability in Tenda AC7 Firmware 15.03.06.44 Tenda AC7 v.15.03.06.44 ate_iwpriv_set has pre-authentication command injection allowing remote attackers to execute arbitrary code. | 8.8 |