Metrics
Affected Vendors & Products
Wed, 24 Sep 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac23 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac23:1.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac23_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac23 Firmware
|
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac23 |
|
| Vendors & Products |
Tenda
Tenda ac23 |
Mon, 22 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda AC23 HTTP POST Request SetPptpServerCfg sscanf buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-22T15:02:07.142Z
Updated: 2025-09-22T17:18:36.553Z
Reserved: 2025-09-21T09:39:45.186Z
Link: CVE-2025-10803
Updated: 2025-09-22T17:17:44.152Z
Status : Analyzed
Published: 2025-09-22T15:15:39.670
Modified: 2025-09-24T20:25:18.200
Link: CVE-2025-10803
No data.