CVE-2021-31755 Scanner
CVE-2021-31755 scanner - Remote Code Execution (RCE) vulnerability in Tenda AC11
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Tenda AC11 is a popular wireless router designed for households and small businesses. It provides excellent connectivity and a high-speed internet browsing experience. It comes with professional features such as easy setup, parental controls, and advanced security options that provide users with a high-speed and secure network experience.
Recently, CVE-2021-31755 vulnerability was detected in Tenda AC11 firmware through 02.03.01.104_CN. This vulnerability exists in /goform/setmac functionality, and it allows attackers to execute arbitrary code on the system via a crafted post request. The stack buffer overflow vulnerability in Tenda AC11 is a critical security issue that needs to be addressed as soon as possible.
When exploited, the CVE-2021-31755 vulnerability can lead to severe consequences. An attacker can gain full control of the affected device, access sensitive information such as passwords, and perform malicious activities such as data theft, botnet attacks, and ransomware. The vulnerability can also result in the device becoming part of a large-scale attack, compromising not only its own security, but that of other devices on the network as well.
Thanks to the pro features of s4e.io platform, it is now easy and quick to learn about vulnerabilities in digital assets. The platform offers advanced scanning tools that can detect and report vulnerabilities in real-time, allowing businesses and individuals to take timely action. In addition, it provides comprehensive analytics and reporting that enable users to gain insight into their network's overall security posture and identify areas that need improvement. By using s4e.io, businesses and individuals can rest assured that their digital assets are safe and secure.
REFERENCES