SB2020063026 - Multiple vulnerabilities in Tenda PA6 Wi-Fi Powerline extender
Published: June 30, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2019-19506)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the "homeplugd" process. A remote attacker can send a specially crafted UDP packet and perform a denial of service (DoS) attack.
2) Stack-based buffer overflow (CVE-ID: CVE-2019-19505)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in "Wireless" section in the web-UI. A remote unauthenticated attacker can send a specially crafted hostname, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Command Injection (CVE-ID: CVE-2019-16213)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to improper input validation. A remote authenticated attacker can send a specially crafted string, modify the device name of an attached PLC adapter and execute arbitrary commands on the target system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.