CVE-2024-0532

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jan 15, 2024
Updated: Mar 21, 2024
CWE ID 121
CWE ID 787

Summary

The CVE-2024-0532 vulnerability has been identified in Tenda A15 15.13.07.13, specifically in the Web-based Management Interface component. This critical vulnerability allows for remote attackers to trigger a stack-based buffer overflow by manipulating the argument wpapsk_crypto2_4g in the /goform/WifiExtraSet file. The exploit has been publicly disclosed and may be used against affected systems. The vendor was notified but did not respond. This vulnerability has a high base severity score of 7.2 (out of 10) and poses a potential danger to organizations due to its impact on confidentiality and integrity, as well as its network accessibility.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-0532 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options