Dismissed
Permalink
CVE-2026-2186
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package go-crx3
- @LeSuisse dismissed
Tenda RX3 SetIpMacBind fromSetIpMacBind stack-based overflow
A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
References
- VDB-344889 | Tenda RX3 SetIpMacBind fromSetIpMacBind stack-based overflow vdb-entry technical-description
- VDB-344889 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749718 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/7 issue-tracking exploit
- https://www.tenda.com.cn/ product
- VDB-344889 | Tenda RX3 SetIpMacBind fromSetIpMacBind stack-based overflow vdb-entry technical-description
- VDB-344889 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749718 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/7 issue-tracking exploit
- https://www.tenda.com.cn/ product
Affected products
RX3
- ==16.03.13.11