Skip to main content

CVE-2023-51954: n/a in n/a

Critical
VulnerabilityCVE-2023-51954cvecve-2023-51954
Published: Wed Jan 10 2024 (01/10/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv.

AI-Powered Analysis

AILast updated: 07/04/2025, 08:27:19 UTC

Technical Analysis

CVE-2023-51954 is a critical stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability exists in the function formSetIptv, specifically triggered via the iptv.stb.port parameter. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This type of vulnerability (CWE-787) can allow an attacker to overwrite the return address or other control data on the stack, potentially enabling arbitrary code execution. The CVSS v3.1 score of 9.8 reflects the high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to any network using the affected Tenda AX1803 router firmware. The lack of a vendor project or patch links suggests that mitigation or vendor response may be pending or limited at this time.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for enterprises and ISPs deploying Tenda AX1803 routers in their network infrastructure. Successful exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network availability, intercept or manipulate traffic, and potentially pivot into internal networks. This could result in data breaches, service outages, and loss of trust. Given the critical nature of the vulnerability and the router's role as a network gateway, the impact extends beyond the device itself to the broader organizational network. Critical infrastructure providers, SMEs, and home office setups relying on this router model are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AX1803 routers running firmware version 1.0.0.1. If identified, they should isolate these devices from critical network segments until patched or mitigated. Since no official patches are currently linked, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators can implement access control measures to restrict management interface access to trusted IP addresses only, employ network segmentation to limit exposure, and enable intrusion detection/prevention systems to monitor for anomalous traffic patterns targeting the iptv.stb.port parameter or related services. Additionally, consider replacing vulnerable devices with alternative hardware if patching is not feasible. Regularly updating router firmware and applying security best practices for device hardening will reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6eed

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/4/2025, 8:27:19 AM

Last updated: 7/27/2025, 2:45:08 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats