CVE-2023-51955: n/a in n/a
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv.
AI Analysis
Technical Summary
CVE-2023-51955 is a medium-severity stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability arises from improper handling of the adv.iptv.stballvlans parameter within the formSetIptv function. Specifically, the stack overflow occurs when this parameter is processed without adequate bounds checking, allowing an attacker to overwrite parts of the stack memory. This type of vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which can lead to unpredictable behavior including crashes or potentially arbitrary code execution. The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact metrics indicate limited confidentiality and integrity impact (C:L, I:L) and no availability impact (A:N). No patches or known exploits in the wild have been reported as of the publication date (January 10, 2024). The vulnerability affects the Tenda AX1803 router, a consumer-grade networking device commonly used for home and small office internet connectivity. Exploitation could allow remote attackers to manipulate IPTV VLAN settings, potentially leading to information disclosure or limited integrity compromise of the device configuration. Given the network-exposed nature of routers, this vulnerability could be leveraged for further network intrusion or lateral movement if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2023-51955 depends largely on the deployment of Tenda AX1803 routers within their network infrastructure. While primarily a consumer-grade device, some small businesses or branch offices may use these routers, making them potential entry points for attackers. Successful exploitation could lead to unauthorized disclosure of IPTV VLAN configurations, which might reveal network segmentation details or traffic routing information. Although the vulnerability does not directly affect availability, the integrity compromise could allow attackers to alter VLAN settings, potentially disrupting IPTV services or enabling further network attacks. In regulated industries, such as telecommunications or media providers in Europe, this could translate into compliance risks or service degradation. Additionally, given the router’s network exposure and lack of required authentication for exploitation, attackers could remotely target vulnerable devices, increasing the risk of widespread compromise in environments where firmware updates are not promptly applied or devices are left with default configurations.
Mitigation Recommendations
To mitigate CVE-2023-51955, European organizations and users should: 1) Immediately verify if Tenda AX1803 routers are deployed within their networks and identify firmware versions. 2) Monitor Tenda’s official channels for firmware updates or patches addressing this vulnerability, and apply them as soon as they become available. 3) If no patch is available, consider disabling IPTV features or the affected adv.iptv.stballvlans parameter if configurable via the router’s management interface to reduce attack surface. 4) Restrict remote management access to the router by limiting it to trusted IP addresses or disabling it entirely if not needed. 5) Change default credentials and enforce strong passwords to prevent unauthorized local access. 6) Employ network segmentation and firewall rules to isolate IPTV traffic and router management interfaces from untrusted networks. 7) Continuously monitor network traffic for unusual activity that could indicate exploitation attempts. 8) Educate users and administrators about the risks of outdated router firmware and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-51955: n/a in n/a
Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv.
AI-Powered Analysis
Technical Analysis
CVE-2023-51955 is a medium-severity stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability arises from improper handling of the adv.iptv.stballvlans parameter within the formSetIptv function. Specifically, the stack overflow occurs when this parameter is processed without adequate bounds checking, allowing an attacker to overwrite parts of the stack memory. This type of vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which can lead to unpredictable behavior including crashes or potentially arbitrary code execution. The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact metrics indicate limited confidentiality and integrity impact (C:L, I:L) and no availability impact (A:N). No patches or known exploits in the wild have been reported as of the publication date (January 10, 2024). The vulnerability affects the Tenda AX1803 router, a consumer-grade networking device commonly used for home and small office internet connectivity. Exploitation could allow remote attackers to manipulate IPTV VLAN settings, potentially leading to information disclosure or limited integrity compromise of the device configuration. Given the network-exposed nature of routers, this vulnerability could be leveraged for further network intrusion or lateral movement if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2023-51955 depends largely on the deployment of Tenda AX1803 routers within their network infrastructure. While primarily a consumer-grade device, some small businesses or branch offices may use these routers, making them potential entry points for attackers. Successful exploitation could lead to unauthorized disclosure of IPTV VLAN configurations, which might reveal network segmentation details or traffic routing information. Although the vulnerability does not directly affect availability, the integrity compromise could allow attackers to alter VLAN settings, potentially disrupting IPTV services or enabling further network attacks. In regulated industries, such as telecommunications or media providers in Europe, this could translate into compliance risks or service degradation. Additionally, given the router’s network exposure and lack of required authentication for exploitation, attackers could remotely target vulnerable devices, increasing the risk of widespread compromise in environments where firmware updates are not promptly applied or devices are left with default configurations.
Mitigation Recommendations
To mitigate CVE-2023-51955, European organizations and users should: 1) Immediately verify if Tenda AX1803 routers are deployed within their networks and identify firmware versions. 2) Monitor Tenda’s official channels for firmware updates or patches addressing this vulnerability, and apply them as soon as they become available. 3) If no patch is available, consider disabling IPTV features or the affected adv.iptv.stballvlans parameter if configurable via the router’s management interface to reduce attack surface. 4) Restrict remote management access to the router by limiting it to trusted IP addresses or disabling it entirely if not needed. 5) Change default credentials and enforce strong passwords to prevent unauthorized local access. 6) Employ network segmentation and firewall rules to isolate IPTV traffic and router management interfaces from untrusted networks. 7) Continuously monitor network traffic for unusual activity that could indicate exploitation attempts. 8) Educate users and administrators about the risks of outdated router firmware and the importance of timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684345db71f4d251b5dc11e5
Added to database: 6/6/2025, 7:47:39 PM
Last enriched: 7/8/2025, 12:11:48 PM
Last updated: 8/16/2025, 9:42:36 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.