Skip to main content

CVE-2024-0532: Stack-based Buffer Overflow in Tenda A15

High
VulnerabilityCVE-2024-0532cvecve-2024-0532
Published: Mon Jan 15 2024 (01/15/2024, 02:00:07 UTC)
Source: CVE
Vendor/Project: Tenda
Product: A15

Description

A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/06/2025, 15:39:31 UTC

Technical Analysis

CVE-2024-0532 is a critical stack-based buffer overflow vulnerability found in the Tenda A15 router, specifically in version 15.13.07.13 of its firmware. The flaw exists in the web-based management interface component, within the function set_repeat5 located in the /goform/WifiExtraSet endpoint. The vulnerability arises from improper handling of the input parameters wpapsk_crypto2_4g and wpapsk_crypto5g, which can be manipulated remotely by an unauthenticated attacker to cause a stack-based buffer overflow. This type of overflow can lead to arbitrary code execution on the device, potentially allowing an attacker to fully compromise the router. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the vendor Tenda was contacted early regarding this issue, no response or patch has been provided as of the publication date. The CVSS v4.0 score is 8.6 (high severity), reflecting the vulnerability’s ease of exploitation (network attack vector, low attack complexity), and its significant impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but the public disclosure of the exploit code increases the likelihood of imminent attacks. This vulnerability threatens the security of the router’s management interface, potentially allowing attackers to take control of the device, intercept or manipulate network traffic, or pivot into internal networks protected by the router.

Potential Impact

For European organizations, the exploitation of CVE-2024-0532 could have serious consequences. Tenda routers like the A15 are commonly used in small to medium-sized enterprises and residential environments across Europe. A successful attack could lead to full compromise of the router, enabling attackers to intercept sensitive communications, inject malicious traffic, or establish persistent footholds inside corporate or home networks. This could result in data breaches, disruption of business operations, or use of compromised routers as part of botnets for further attacks. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this device. Additionally, the vulnerability’s remote and unauthenticated nature means attackers can exploit it over the internet without needing internal access, broadening the attack surface. Given the critical role routers play in network security, exploitation could undermine perimeter defenses and impact confidentiality, integrity, and availability of network resources.

Mitigation Recommendations

Since no official patch or update is currently available from Tenda, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the router’s web management interface by limiting it to trusted internal IP addresses or disabling remote management entirely if not required. 2) Employing network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 3) Monitoring network traffic for unusual activity or signs of exploitation attempts targeting the /goform/WifiExtraSet endpoint. 4) Considering replacement of affected Tenda A15 devices with alternative routers from vendors with active security support and patching. 5) Applying strict firewall rules to block unauthorized inbound connections to router management ports. 6) Educating users and administrators about the risks and signs of router compromise. Once a vendor patch becomes available, prompt testing and deployment should be prioritized. Additionally, organizations should maintain up-to-date inventories of network devices to quickly identify affected models.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-14T16:44:16.404Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aeca23

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 3:39:31 PM

Last updated: 7/31/2025, 10:47:24 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats