Filtered by vendor Tenda
Subscriptions
Filtered by product Fh1205
Subscriptions
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-6112 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-07-18 | 8.8 High |
A vulnerability, which was classified as critical, has been found in Tenda FH1205 2.0.0.7. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-7596 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-07-17 | 8.8 High |
A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been rated as critical. This issue affects the function formWifiExtraSet of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-6111 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-06-17 | 8.8 High |
A vulnerability classified as critical was found in Tenda FH1205 2.0.0.7(775). This vulnerability affects the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2024-3008 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-04-08 | 8.8 High |
A vulnerability, which was classified as critical, was found in Tenda FH1205 2.0.0.7(775). Affected is the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258294 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-32313 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-17 | 6.5 Medium |
Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the adslPwd parameter of the formWanParameterSetting function. | ||||
CVE-2024-32307 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-17 | 7.4 High |
Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function. | ||||
CVE-2024-30628 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-14 | 9.8 Critical |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the page parameter from fromAddressNat function. | ||||
CVE-2024-30632 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 6.5 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security_5g parameter from formWifiBasicSet function. | ||||
CVE-2024-30633 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 6.5 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security parameter from the formWifiBasicSet function. | ||||
CVE-2024-30622 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 9.8 Critical |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the mitInterface parameter from fromAddressNat function. | ||||
CVE-2024-30623 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 6.5 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the page parameter from fromDhcpListClient function. | ||||
CVE-2024-30629 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 5.7 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the list1 parameter from fromDhcpListClient function. | ||||
CVE-2024-30624 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 8.8 High |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the urls parameter from saveParentControlInfo function. | ||||
CVE-2024-30625 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 8.0 High |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter from fromAddressNat function. | ||||
CVE-2024-30626 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 8.0 High |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function. | ||||
CVE-2024-30627 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 8.8 High |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the deviceId parameter from saveParentControlInfo function. | ||||
CVE-2024-30630 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 9.8 Critical |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the time parameter from saveParentControlInfo function. | ||||
CVE-2024-30631 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-03-13 | 4.3 Medium |
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime parameter from setSchedWifi function. | ||||
CVE-2024-3012 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-01-15 | 8.8 High |
A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been declared as critical. This vulnerability affects the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258298 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-3010 | 1 Tenda | 2 Fh1205, Fh1205 Firmware | 2025-01-15 | 8.8 High |
A vulnerability was found in Tenda FH1205 2.0.0.7(775) and classified as critical. Affected by this issue is the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258296. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |