A vulnerability was found in Tenda i9 1.0.0.8(3828) and classified as critical. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product does not release or incorrectly releases a resource before it is made available for re-use.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://vuldb.com/?id.285971 | vdb entry permissions required technical description |
https://vuldb.com/?ctiid.285971 | signature vdb entry permissions required |
https://vuldb.com/?submit.446592 | third party advisory vdb entry |
https://github.com/xiaobor123/tenda-vul-i9 | third party advisory exploit |
https://www.tenda.com.cn/ | product |