CVE-2023-51954: n/a in n/a
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv.
AI Analysis
Technical Summary
CVE-2023-51954 is a critical stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability exists in the function formSetIptv, specifically triggered via the iptv.stb.port parameter. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This type of vulnerability (CWE-787) can allow an attacker to overwrite the return address or other control data on the stack, potentially enabling arbitrary code execution. The CVSS v3.1 score of 9.8 reflects the high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to any network using the affected Tenda AX1803 router firmware. The lack of a vendor project or patch links suggests that mitigation or vendor response may be pending or limited at this time.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for enterprises and ISPs deploying Tenda AX1803 routers in their network infrastructure. Successful exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network availability, intercept or manipulate traffic, and potentially pivot into internal networks. This could result in data breaches, service outages, and loss of trust. Given the critical nature of the vulnerability and the router's role as a network gateway, the impact extends beyond the device itself to the broader organizational network. Critical infrastructure providers, SMEs, and home office setups relying on this router model are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active exploitation emerges.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda AX1803 routers running firmware version 1.0.0.1. If identified, they should isolate these devices from critical network segments until patched or mitigated. Since no official patches are currently linked, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators can implement access control measures to restrict management interface access to trusted IP addresses only, employ network segmentation to limit exposure, and enable intrusion detection/prevention systems to monitor for anomalous traffic patterns targeting the iptv.stb.port parameter or related services. Additionally, consider replacing vulnerable devices with alternative hardware if patching is not feasible. Regularly updating router firmware and applying security best practices for device hardening will reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-51954: n/a in n/a
Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv.
AI-Powered Analysis
Technical Analysis
CVE-2023-51954 is a critical stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability exists in the function formSetIptv, specifically triggered via the iptv.stb.port parameter. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This type of vulnerability (CWE-787) can allow an attacker to overwrite the return address or other control data on the stack, potentially enabling arbitrary code execution. The CVSS v3.1 score of 9.8 reflects the high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to any network using the affected Tenda AX1803 router firmware. The lack of a vendor project or patch links suggests that mitigation or vendor response may be pending or limited at this time.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for enterprises and ISPs deploying Tenda AX1803 routers in their network infrastructure. Successful exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network availability, intercept or manipulate traffic, and potentially pivot into internal networks. This could result in data breaches, service outages, and loss of trust. Given the critical nature of the vulnerability and the router's role as a network gateway, the impact extends beyond the device itself to the broader organizational network. Critical infrastructure providers, SMEs, and home office setups relying on this router model are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active exploitation emerges.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda AX1803 routers running firmware version 1.0.0.1. If identified, they should isolate these devices from critical network segments until patched or mitigated. Since no official patches are currently linked, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators can implement access control measures to restrict management interface access to trusted IP addresses only, employ network segmentation to limit exposure, and enable intrusion detection/prevention systems to monitor for anomalous traffic patterns targeting the iptv.stb.port parameter or related services. Additionally, consider replacing vulnerable devices with alternative hardware if patching is not feasible. Regularly updating router firmware and applying security best practices for device hardening will reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6eed
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 8:27:19 AM
Last updated: 7/27/2025, 2:45:08 AM
Views: 8
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.