CVE-2023-51964: n/a in n/a
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function setIptvInfo.
AI Analysis
Technical Summary
CVE-2023-51964 is a critical stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The flaw exists in the function setIptvInfo, specifically triggered by the iptv.stb.port parameter. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system crashes. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. The CWE-787 classification confirms this is a classic stack-based buffer overflow issue. No patches or fixes have been linked yet, and there are no known exploits in the wild at the time of publication. However, given the ease of exploitation and the critical impact, this vulnerability poses a significant risk to affected devices.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. The Tenda AX1803 router is commonly used in small to medium-sized enterprises and residential environments for internet connectivity and IPTV services. Exploitation could allow attackers to gain full control over the router, intercept or manipulate network traffic, disrupt internet access, or pivot into internal networks. This could lead to data breaches, espionage, service outages, and compromise of connected devices. Critical infrastructure providers, ISPs, and enterprises relying on Tenda routers for IPTV or network management could face operational disruptions and reputational damage. The lack of authentication requirement and remote exploitability increases the risk of widespread attacks, especially in environments where these routers are exposed to the internet or poorly segmented internal networks.
Mitigation Recommendations
Organizations should immediately identify and isolate Tenda AX1803 routers running firmware version 1.0.0.1. Since no official patch is currently available, network administrators should implement compensating controls such as restricting access to router management interfaces via firewall rules, disabling IPTV services if not needed, and segmenting affected devices away from critical network segments. Monitoring network traffic for unusual activity targeting the iptv.stb.port parameter or signs of exploitation attempts is recommended. Vendors and users should prioritize firmware updates once patches are released. Additionally, deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts against Tenda routers can help detect and block exploitation attempts. Regularly auditing network devices for outdated firmware and applying security best practices for IoT and network equipment is essential.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-51964: n/a in n/a
Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function setIptvInfo.
AI-Powered Analysis
Technical Analysis
CVE-2023-51964 is a critical stack overflow vulnerability identified in the Tenda AX1803 router firmware version 1.0.0.1. The flaw exists in the function setIptvInfo, specifically triggered by the iptv.stb.port parameter. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system crashes. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. The CWE-787 classification confirms this is a classic stack-based buffer overflow issue. No patches or fixes have been linked yet, and there are no known exploits in the wild at the time of publication. However, given the ease of exploitation and the critical impact, this vulnerability poses a significant risk to affected devices.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. The Tenda AX1803 router is commonly used in small to medium-sized enterprises and residential environments for internet connectivity and IPTV services. Exploitation could allow attackers to gain full control over the router, intercept or manipulate network traffic, disrupt internet access, or pivot into internal networks. This could lead to data breaches, espionage, service outages, and compromise of connected devices. Critical infrastructure providers, ISPs, and enterprises relying on Tenda routers for IPTV or network management could face operational disruptions and reputational damage. The lack of authentication requirement and remote exploitability increases the risk of widespread attacks, especially in environments where these routers are exposed to the internet or poorly segmented internal networks.
Mitigation Recommendations
Organizations should immediately identify and isolate Tenda AX1803 routers running firmware version 1.0.0.1. Since no official patch is currently available, network administrators should implement compensating controls such as restricting access to router management interfaces via firewall rules, disabling IPTV services if not needed, and segmenting affected devices away from critical network segments. Monitoring network traffic for unusual activity targeting the iptv.stb.port parameter or signs of exploitation attempts is recommended. Vendors and users should prioritize firmware updates once patches are released. Additionally, deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts against Tenda routers can help detect and block exploitation attempts. Regularly auditing network devices for outdated firmware and applying security best practices for IoT and network equipment is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6ef1
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 8:24:33 AM
Last updated: 7/31/2025, 3:10:58 PM
Views: 8
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.