cve/2024/CVE-2024-10434.md
2025-09-29 16:08:36 +00:00

18 lines
874 B
Markdown

### [CVE-2024-10434](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10434)
![](https://img.shields.io/static/v1?label=Product&message=AC1206&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2020241027%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20Buffer%20Overflow&color=brighgreen)
### Description
A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### POC
#### Reference
- https://vuldb.com/?id.281985
#### Github
No PoCs found on GitHub currently.