Description
An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsIP, dhcpsMac);`, the lack of size validation for the rules could lead to buffer overflows in `dhcpsIndex`, `dhcpsIP`, and `dhcpsMac`.
INFO
Published Date :
2026-03-02T00:00:00.000Z
Last Modified :
2026-03-02T16:07:39.459Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2026-24110 vulnerability.
| Vendors | Products |
|---|---|
| Tenda |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-24110.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact