Tenda O3V2 v1.0.0.12(3880) was discovered to contain a Blind Command Injection via stpEn parameter in the SetStp function. This vulnerability allows attackers to execute arbitrary commands with root privileges.
References
Link | Resource |
---|---|
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:tendacn:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* |
cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:* |
First Time |
Tenda o3 Firmware
Tenda Tenda o3 |
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ - Exploit, Third Party Advisory |
11 Jun 2024, 14:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Tendacn
Tendacn o3v2 Tendacn o3v2 Firmware |
|
CWE | CWE-77 | |
CPE | cpe:2.3:o:tendacn:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* cpe:2.3:h:tendacn:o3v2:-:*:*:*:*:*:*:* |
|
References | () https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ - Exploit, Third Party Advisory |
05 Jun 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2024, 19:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-04 19:20
Updated : 2024-12-13 15:15
NVD link : CVE-2024-36604
Mitre link : CVE-2024-36604
CVE.ORG link : CVE-2024-36604
JSON object : View
Products Affected
tenda
- o3
- o3_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')