cve/2024/CVE-2024-2993.md

21 lines
1.5 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-2993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2993)
![](https://img.shields.io/static/v1?label=Product&message=FH1203&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.0.1.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen)
### Description
A vulnerability was found in Tenda FH1203 2.0.1.6. It has been classified as critical. Affected is the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in Tenda FH1203 2.0.1.6 ausgemacht. Es geht dabei um die Funktion formQuickIndex der Datei /goform/QuickIndex. Durch die Manipulation des Arguments PPPOEPassword mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/LaPhilosophie/IoT-vulnerable
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/gh-ost00/IOT-Vulnerable_POC