{"vulnerability": "cve-2024-0533", "sightings": [{"uuid": "c90e6236-ba8f-443f-8992-c9942a3f58f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0533", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18325", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-0533\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2024-01-15T02:31:04.275Z\n\ud83d\udccf Modified: 2025-06-13T19:09:23.960Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.250703\n2. https://vuldb.com/?ctiid.250703\n3. https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md", "creation_timestamp": "2025-06-13T19:34:56.000000Z"}, {"uuid": "23c27c11-0bfc-4a22-b7e2-9cee83bf4e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0533", "type": "seen", "source": "https://t.me/arpsyndicate/3096", "content": "#ExploitObserverAlert\n\nCVE-2024-0533\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0533. A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\nFIRST-EPSS: 0.001140000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2024-01-26T22:24:56.000000Z"}, {"uuid": "8c885748-1898-4aa0-be22-5434a52caea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0533", "type": "seen", "source": "https://t.me/ctinow/178447", "content": "https://ift.tt/Ji53Rj6\nCVE-2024-0533 | Tenda A15 15.13.07.13 Web-based Management Interface /goform/SetOnlineDevName devName stack-based overflow", "creation_timestamp": "2024-02-03T09:46:26.000000Z"}, {"uuid": "c1d34865-0394-4805-919d-b84232488a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0533", "type": "seen", "source": "https://t.me/ctinow/170400", "content": "https://ift.tt/OvpC53f\nCVE-2024-0533 Exploit", "creation_timestamp": "2024-01-19T21:16:21.000000Z"}, {"uuid": "9d18b430-66d5-4e7b-bd9e-3f71d678bac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0533", "type": "seen", "source": "https://t.me/ctinow/168138", "content": "https://ift.tt/FnfJm69\nCVE-2024-0533", "creation_timestamp": "2024-01-15T04:26:30.000000Z"}]}