Skip to main content

CVE-2023-51955: n/a in n/a

Medium
VulnerabilityCVE-2023-51955cvecve-2023-51955
Published: Wed Jan 10 2024 (01/10/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:11:48 UTC

Technical Analysis

CVE-2023-51955 is a medium-severity stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The vulnerability arises from improper handling of the adv.iptv.stballvlans parameter within the formSetIptv function. Specifically, the stack overflow occurs when this parameter is processed without adequate bounds checking, allowing an attacker to overwrite parts of the stack memory. This type of vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which can lead to unpredictable behavior including crashes or potentially arbitrary code execution. The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact metrics indicate limited confidentiality and integrity impact (C:L, I:L) and no availability impact (A:N). No patches or known exploits in the wild have been reported as of the publication date (January 10, 2024). The vulnerability affects the Tenda AX1803 router, a consumer-grade networking device commonly used for home and small office internet connectivity. Exploitation could allow remote attackers to manipulate IPTV VLAN settings, potentially leading to information disclosure or limited integrity compromise of the device configuration. Given the network-exposed nature of routers, this vulnerability could be leveraged for further network intrusion or lateral movement if exploited successfully.

Potential Impact

For European organizations, the impact of CVE-2023-51955 depends largely on the deployment of Tenda AX1803 routers within their network infrastructure. While primarily a consumer-grade device, some small businesses or branch offices may use these routers, making them potential entry points for attackers. Successful exploitation could lead to unauthorized disclosure of IPTV VLAN configurations, which might reveal network segmentation details or traffic routing information. Although the vulnerability does not directly affect availability, the integrity compromise could allow attackers to alter VLAN settings, potentially disrupting IPTV services or enabling further network attacks. In regulated industries, such as telecommunications or media providers in Europe, this could translate into compliance risks or service degradation. Additionally, given the router’s network exposure and lack of required authentication for exploitation, attackers could remotely target vulnerable devices, increasing the risk of widespread compromise in environments where firmware updates are not promptly applied or devices are left with default configurations.

Mitigation Recommendations

To mitigate CVE-2023-51955, European organizations and users should: 1) Immediately verify if Tenda AX1803 routers are deployed within their networks and identify firmware versions. 2) Monitor Tenda’s official channels for firmware updates or patches addressing this vulnerability, and apply them as soon as they become available. 3) If no patch is available, consider disabling IPTV features or the affected adv.iptv.stballvlans parameter if configurable via the router’s management interface to reduce attack surface. 4) Restrict remote management access to the router by limiting it to trusted IP addresses or disabling it entirely if not needed. 5) Change default credentials and enforce strong passwords to prevent unauthorized local access. 6) Employ network segmentation and firewall rules to isolate IPTV traffic and router management interfaces from untrusted networks. 7) Continuously monitor network traffic for unusual activity that could indicate exploitation attempts. 8) Educate users and administrators about the risks of outdated router firmware and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684345db71f4d251b5dc11e5

Added to database: 6/6/2025, 7:47:39 PM

Last enriched: 7/8/2025, 12:11:48 PM

Last updated: 8/16/2025, 9:42:36 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats