Skip to main content

CVE-2023-49404: n/a in n/a

Critical
VulnerabilityCVE-2023-49404cvecve-2023-49404
Published: Thu Dec 07 2023 (12/07/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formAdvancedSetListSet.

AI-Powered Analysis

AILast updated: 07/07/2025, 08:54:44 UTC

Technical Analysis

CVE-2023-49404 is a critical stack overflow vulnerability identified in the Tenda W30E router firmware version V16.01.0.12(4843). The flaw exists in the function formAdvancedSetListSet, which is part of the device's web interface or configuration management system. A stack overflow occurs when the function improperly handles input data, allowing an attacker to overwrite parts of the stack memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is highly severe. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. Although no known exploits are reported in the wild yet, the ease of exploitation and critical impact make this a significant threat. The vulnerability is classified under CWE-787 (Out-of-bounds Write), which typically leads to memory corruption issues. The lack of a vendor project or product name beyond the device model suggests limited public information, but the affected product is clearly the Tenda W30E router, a consumer-grade networking device commonly used in home and small office environments. The absence of a patch link indicates that no official fix has been released at the time of publication, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for small and medium enterprises (SMEs) and home offices that rely on Tenda W30E routers for internet connectivity. Successful exploitation could allow attackers to gain full control over the affected device, leading to network infiltration, interception of sensitive data, disruption of internet services, and pivoting to internal networks. This could compromise confidentiality of communications, integrity of network configurations, and availability of internet access. Given the router's role as a network gateway, attackers could also launch further attacks against connected systems or use the device as part of a botnet. The critical severity and remote exploitability without authentication make it a high-priority threat. European organizations with limited IT security resources may be particularly vulnerable if they have not implemented network segmentation or device monitoring. Additionally, the lack of a patch means organizations must rely on interim mitigations to reduce exposure.

Mitigation Recommendations

1. Immediate mitigation should include isolating the Tenda W30E routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces on the router to prevent external exploitation. 3. Restrict access to the router's web interface to trusted internal IP addresses only. 4. Monitor network traffic for unusual activity originating from or targeting the router. 5. If possible, replace the affected router with a different model or vendor that has no known vulnerabilities. 6. Regularly check for firmware updates from Tenda and apply patches promptly once available. 7. Implement network segmentation to protect sensitive systems from compromised devices. 8. Educate users about the risks of using vulnerable devices and encourage reporting of unusual network behavior. 9. Employ intrusion detection/prevention systems that can detect exploitation attempts targeting stack overflow vulnerabilities. These steps go beyond generic advice by focusing on network architecture changes and proactive monitoring tailored to this specific device and vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68372bbe182aa0cae2520284

Added to database: 5/28/2025, 3:29:02 PM

Last enriched: 7/7/2025, 8:54:44 AM

Last updated: 8/15/2025, 1:58:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats