Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-10280
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
空指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tenda多款产品代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenda AC7等都是中国腾达(Tenda)公司的产品。Tenda AC7是一款无线路由器。Tenda AC9是一款无线路由器。Tenda AC10是一款无线路由器。 Tenda多款产品存在代码问题漏洞,该漏洞源于/goform/GetIPTV页面的websReadEvent函数中的Content-Length参数包含一个空指针取消引用漏洞。以下产品受到影响:Tenda AC6、AC7、AC8、AC9、AC10、AC10U、AC15、AC18、AC500和AC1206。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
TendaAC6 20241022 -
TendaAC7 20241022 -
TendaAC8 20241022 -
TendaAC9 20241022 -
TendaAC10 20241022 -
TendaAC10U 20241022 -
TendaAC15 20241022 -
TendaAC18 20241022 -
TendaAC500 20241022 -
TendaAC1206 20241022 -
II. Public POCs for CVE-2024-10280
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-10280
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-10280

No comments yet


Leave a comment