CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-4494

Critical Severity
Tenda
SVRS
80/100

CVSSv3
8.8/10

EPSS
0.00284/1

CVE-2024-4494 is a critical stack-based buffer overflow vulnerability found in Tenda i21 1.0.0.14(4656). Exploitation of the formSetUplinkInfo function via manipulation of the pingHostIp2 argument in /goform/setUplinkInfo allows for remote code execution. Given its SVRS score of 80, this vulnerability demands immediate attention and patching. Public exploit code is available, indicating active exploitation in the wild. The lack of vendor response exacerbates the risk. This vulnerability could allow attackers to gain full control of affected Tenda devices, making it a significant threat to network security. The high CVSS score of 8.8 further highlights the severity of this critical vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-05-05

2025-01-27

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-4494 | Tenda i21 1.0.0.14(4656) /goform/setUplinkInfo formSetUplinkInfo pingHostIp2 stack-based overflow
vuldb.com2025-01-28
CVE-2024-4494 | Tenda i21 1.0.0.14(4656) /goform/setUplinkInfo formSetUplinkInfo pingHostIp2 stack-based overflow | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this vulnerability is the function formSetUplinkInfo of the file /goform/setUplinkInfo. The manipulation of the argument pingHostIp2 leads to stack-based buffer overflow. This vulnerability is known as <a href="https://vuldb.com/?source_cve.263083
cve-2024-4494
exploit
gt
cve

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
OSTendai21_firmware

References

ReferenceLink
[email protected]https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md
[email protected]https://vuldb.com/?ctiid.263083
[email protected]https://vuldb.com/?id.263083
[email protected]https://vuldb.com/?submit.323604
AF854A3A-2127-422B-91AE-364DA2661108https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md
AF854A3A-2127-422B-91AE-364DA2661108https://vuldb.com/?ctiid.263083
AF854A3A-2127-422B-91AE-364DA2661108https://vuldb.com/?id.263083
AF854A3A-2127-422B-91AE-364DA2661108https://vuldb.com/?submit.323604
[email protected]https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md
[email protected]https://vuldb.com/?ctiid.263083
[email protected]https://vuldb.com/?id.263083
[email protected]https://vuldb.com/?submit.323604
GITHUBhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md

CWE Details

CWE IDCWE NameDescription
CWE-121Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CWE-787Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence