Filtered by vendor Tenda Subscriptions
Total 1384 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-50528 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-01 7.3 High
A buffer overflow vulnerability exists in the fromNatStaticSetting function of Tenda AC6 <=V15.03.05.19 via the page parameter.
CVE-2025-0566 1 Tenda 2 Ac15, Ac15 Firmware 2025-07-01 8.8 High
A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-34338 1 Tenda 3 O3, O3 Firmware, O3v2 2025-06-30 7.2 High
Tenda O3V2 with firmware versions V1.0.0.10 and V1.0.0.12 was discovered to contain a Blind Command Injection via dest parameter in /goform/getTraceroute. This vulnerability allows attackers to execute arbitrary commands with root privileges. Authentication is required to exploit this vulnerability.
CVE-2024-25343 1 Tenda 2 N300, N300 Firmware 2025-06-30 9.1 Critical
Tenda N300 F3 router vulnerability allows users to bypass intended security policy and create weak passwords.
CVE-2024-32303 1 Tenda 2 Ac15, Ac15 Firmware 2025-06-30 8 High
Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2025-4867 1 Tenda 2 A15, A15 Firmware 2025-06-24 6.5 Medium
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as problematic. Affected by this vulnerability is the function formArpNerworkSet of the file /goform/ArpNerworkSet. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5080 1 Tenda 2 Fh451, Fh451 Firmware 2025-06-24 8.8 High
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function webExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-46035 1 Tenda 2 Ac6, Ac6 Firmware 2025-06-23 7.5 High
Buffer Overflow vulnerability in Tenda AC6 v.15.03.05.16 allows a remote attacker to cause a denial of service via the oversized schedStartTime and schedEndTime parameters in an unauthenticated HTTP GET request to the /goform/openSchedWifi endpoint
CVE-2023-51970 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
CVE-2023-51969 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function getIptvInfo.
CVE-2023-51967 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function getIptvInfo.
CVE-2023-51966 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo.
CVE-2023-51965 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.
CVE-2023-51963 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo.
CVE-2023-51953 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
CVE-2023-51952 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-06-20 9.8 Critical
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formSetIptv.
CVE-2025-5978 1 Tenda 2 Fh1202, Fh1202 Firmware 2025-06-20 8.8 High
A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-0996 1 Tenda 2 I9, I9 Firmware 2025-06-17 7.2 High
A vulnerability classified as critical has been found in Tenda i9 1.0.0.9(4122). This affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252261 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-0924 1 Tenda 2 Ac10u, Ac10u Firmware 2025-06-17 4.7 Medium
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function formSetPPTPServer. The manipulation of the argument startIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-0536 1 Tenda 2 W9, W9 Firmware 2025-06-17 8.8 High
A vulnerability, which was classified as critical, has been found in Tenda W9 1.0.0.7(4456). Affected by this issue is the function setWrlAccessList of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250706 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.