A vulnerability was found in Tenda AC9 15.03.06.42_multi and classified as critical. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-2192. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Tenda AC9 15.03.06.42_multi and classified as critical. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow.
This vulnerability appears as CVE-2026-2191. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.8.1. This affects the function ovl_verify_area. Performing a manipulation results in reachable assertion.
This vulnerability is reported as CVE-2024-27069. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.22/6.7.10/6.8.1. The impacted element is the function devm_krealloc of the component lvts_thermal. Such manipulation leads to memory leak.
This vulnerability is documented as CVE-2024-27068. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.22/6.7.10/6.8.1. It has been rated as critical. The affected element is the function use_dma_api of the component virtio. This manipulation causes memory leak.
This vulnerability is registered as CVE-2024-27066. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.22/6.7/6.7.10/6.8.1. Affected by this vulnerability is the function WARN of the component evtchn. This manipulation causes denial of service.
The identification of this vulnerability is CVE-2024-27067. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.23/6.7.11/6.8.2 and classified as critical. This affects the function get_device_state of the component netdev. This manipulation causes denial of service.
The identification of this vulnerability is CVE-2024-27063. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.6.22/6.7.10/6.8.1. It has been classified as critical. This issue affects the function nft_netdev_register_hooks of the component Netfilter. The manipulation leads to memory leak.
This vulnerability is listed as CVE-2024-27064. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.8.1. It has been declared as problematic. Impacted is an unknown function of the component nf_tables. The manipulation results in incorrect comparison.
This vulnerability is cataloged as CVE-2024-27065. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.23/6.7.11. It has been rated as critical. Affected by this issue is the function sun8i_ce_cipher_unprepare of the component Virtual Address Handler. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2024-27061. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.6.23/6.7.11 and classified as problematic. This impacts an unknown function of the component nouveau. Such manipulation leads to allocation of resources.
This vulnerability is referenced as CVE-2024-27062. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.7.11. The affected element is the function tb_port_update_credits of the component thunderbolt. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-27060. The attack can only be initiated within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.7.11. Affected by this issue is the function isd200_Initialization of the component usb-storage. The manipulation results in denial of service.
This vulnerability is reported as CVE-2024-27059. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.6.23/6.7.11/6.8.2/6.9-rc1. Affected by this vulnerability is the function shmem_release_dquot. The manipulation leads to denial of service.
This vulnerability is documented as CVE-2024-27058. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.22/6.7.10 and classified as critical. The affected element is the function sof_ipc4_pcm_hw_free of the component ASoC. This manipulation causes denial of service.
This vulnerability is handled as CVE-2024-27057. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.