Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13391

EPSS 2.15% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-13391

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Tenda产品缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenda AC9等都是中国腾达(Tenda)公司的一款无线路由器。 多款Tenda产品中的httpd存在缓冲区错误漏洞。攻击者可通过向/goform/SetSpeedWan URL发送‘speed_dir’参数利用该漏洞执行任意代码。以下产品及版本受到影响:Tenda AC6 V1.0 V15.03.05.19_multi_TD01版本,AC9 V1.0 V15.03.05.19(6318)_CN版本,AC9 V3.0 V15.03.06.42_multi版本,AC15 V1.0 V15.03.05.1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-13391

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-13391

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-05-22 · 20 CVEs total

CVE-2020-13392多款Tenda产品缓冲区错误漏洞
CVE-2020-13398FreeRDP 缓冲区错误漏洞
CVE-2020-13397FreeRDP 缓冲区错误漏洞
CVE-2020-13396FreeRDP 缓冲区错误漏洞
CVE-2020-13384Monstra CMS 代码问题漏洞
CVE-2020-8789ocProducts Composr CMS 跨站脚本漏洞
CVE-2020-6091爱普生 EPSON EB-1470Ui 授权问题漏洞
CVE-2020-7658meinheld 环境问题漏洞
CVE-2020-13394多款Tenda产品缓冲区错误漏洞
CVE-2020-13393多款Tenda产品缓冲区错误漏洞
CVE-2020-13412Aviatrix Systems Controller 跨站请求伪造漏洞
CVE-2020-13390多款Tenda产品缓冲区错误漏洞
CVE-2020-13389多款Tenda产品缓冲区错误漏洞
CVE-2020-13388jw.util 操作系统命令注入漏洞
CVE-2020-13417Aviatrix Systems Aviatrix VPN Client 安全漏洞
CVE-2020-13416Aviatrix Systems Controller 跨站请求伪造漏洞
CVE-2020-13415Aviatrix Systems Controller 数据伪造问题漏洞
CVE-2020-13414Aviatrix Systems Controller 信任管理问题漏洞
CVE-2020-13413Aviatrix Systems Controller 信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-13391

No comments yet


Leave a comment