CVE-2024-4252

A vulnerability classified as critical has been found in Tenda i22 1.0.0.3(4687). This affects the function formSetUrlFilterRule. The manipulation of the argument groupIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md Broken Link
https://vuldb.com/?ctiid.262143 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.262143 Third Party Advisory VDB Entry
https://vuldb.com/?submit.319840 Third Party Advisory VDB Entry
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md Broken Link
https://vuldb.com/?ctiid.262143 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.262143 Third Party Advisory VDB Entry
https://vuldb.com/?submit.319840 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:i22_firmware:1.0.0.3\(4687\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*

History

27 Jan 2025, 18:27

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md - Broken Link
References () https://vuldb.com/?ctiid.262143 - () https://vuldb.com/?ctiid.262143 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.262143 - () https://vuldb.com/?id.262143 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.319840 - () https://vuldb.com/?submit.319840 - Third Party Advisory, VDB Entry
First Time Tenda i22
Tenda
Tenda i22 Firmware
CPE cpe:2.3:o:tenda:i22_firmware:1.0.0.3\(4687\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*
CWE CWE-787

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md -
References () https://vuldb.com/?ctiid.262143 - () https://vuldb.com/?ctiid.262143 -
References () https://vuldb.com/?id.262143 - () https://vuldb.com/?id.262143 -
References () https://vuldb.com/?submit.319840 - () https://vuldb.com/?submit.319840 -

14 May 2024, 15:43

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Tenda i22 1.0.0.3(4687) y clasificada como crítica. Esto afecta a la función formSetUrlFilterRule. La manipulación del argumento groupIndex conduce a un desbordamiento de búfer en la región stack de la memoria. Es posible iniciar el ataque de forma remota. El identificador asociado de esta vulnerabilidad es VDB-262143. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

27 Apr 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-27 14:15

Updated : 2025-01-27 18:27


NVD link : CVE-2024-4252

Mitre link : CVE-2024-4252

CVE.ORG link : CVE-2024-4252


JSON object : View

Products Affected

tenda

  • i22_firmware
  • i22
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write