CVE-2024-0532

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jan 15, 2024
Updated: Mar 21, 2024
CWE ID 121
CWE ID 787

Summary

The CVE-2024-0532 vulnerability has been identified in Tenda A15 15.13.07.13, specifically in the Web-based Management Interface component. This critical vulnerability allows for remote attackers to trigger a stack-based buffer overflow by manipulating the argument wpapsk_crypto2_4g in the /goform/WifiExtraSet file. The exploit has been publicly disclosed and may be used against affected systems. The vendor was notified but did not respond. This vulnerability has a high base severity score of 7.2 (out of 10) and poses a potential danger to organizations due to its impact on confidentiality and integrity, as well as its network accessibility.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-0532 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions