Dismissed
Permalink
CVE-2026-2180
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @jopejoe1 Activity log
- Created automatic suggestion
- @LeSuisse removed package go-crx3
- @jopejoe1 dismissed
Tenda RX3 fast_setting_wifi_set stack-based overflow
A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
References
- VDB-344883 | Tenda RX3 fast_setting_wifi_set stack-based overflow vdb-entry technical-description
- VDB-344883 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749703 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/4 issue-tracking exploit
- https://www.tenda.com.cn/ product
- VDB-344883 | Tenda RX3 fast_setting_wifi_set stack-based overflow vdb-entry technical-description
- VDB-344883 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749703 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/4 issue-tracking exploit
- https://www.tenda.com.cn/ product
Affected products
RX3
- ==16.03.13.11