In Tenda G3 US_G3V3.0br_V15.11.0.6(7663)_EN_TDE, there is a buffer overflow vulnerability caused by strcpy in function 0x869f4 in the httpd binary.
References
Link | Resource |
---|---|
https://github.com/Davidteeri/Bug-Report/blob/main/tenda-G3-%200x869f4.md | Broken Link Third Party Advisory |
https://www.tendacn.com/download/detail-3401.html | Patch Vendor Advisory |
https://github.com/Davidteeri/Bug-Report/blob/main/tenda-G3-%200x869f4.md | Broken Link Third Party Advisory |
https://www.tendacn.com/download/detail-3401.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Davidteeri/Bug-Report/blob/main/tenda-G3-%200x869f4.md - Broken Link, Third Party Advisory | |
References | () https://www.tendacn.com/download/detail-3401.html - Patch, Vendor Advisory |
Information
Published : 2022-09-08 00:15
Updated : 2024-11-21 07:13
NVD link : CVE-2022-36586
Mitre link : CVE-2022-36586
CVE.ORG link : CVE-2022-36586
JSON object : View
Products Affected
tenda
- g3_firmware
- g3
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')