tenda AC9 Security Vulnerabilities

11 Vulnerabilities
Description

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2021-31624, Last Modified: 2021-10-29T11:15:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2021-31627, Last Modified: 2021-10-29T11:15:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-20746, Last Modified: 2021-09-30T21:15:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/openSchedWifi schedStartTime and schedEndTime parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13389, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/addressNat entrys and mitInterface parameters for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13390, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13391, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/setcfm funcpara1 parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13392, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/saveParentControlInfo deviceId and time parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13393, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetNetControlList list parameter for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13394, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2019-5071, Last Modified: 2019-11-21T18:48:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup

An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS2 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2019-5072, Last Modified: 2019-11-21T18:48:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC9-router-setup
Free Home-Networking Courses, tutorials and security checklists

USAGE: Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.