CVE-2024-0532: Stack-based Buffer Overflow in Tenda A15
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0532 is a critical stack-based buffer overflow vulnerability found in the Tenda A15 router, specifically in version 15.13.07.13 of its firmware. The flaw exists in the web-based management interface component, within the function set_repeat5 located in the /goform/WifiExtraSet endpoint. The vulnerability arises from improper handling of the input parameters wpapsk_crypto2_4g and wpapsk_crypto5g, which can be manipulated remotely by an unauthenticated attacker to cause a stack-based buffer overflow. This type of overflow can lead to arbitrary code execution on the device, potentially allowing an attacker to fully compromise the router. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the vendor Tenda was contacted early regarding this issue, no response or patch has been provided as of the publication date. The CVSS v4.0 score is 8.6 (high severity), reflecting the vulnerability’s ease of exploitation (network attack vector, low attack complexity), and its significant impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but the public disclosure of the exploit code increases the likelihood of imminent attacks. This vulnerability threatens the security of the router’s management interface, potentially allowing attackers to take control of the device, intercept or manipulate network traffic, or pivot into internal networks protected by the router.
Potential Impact
For European organizations, the exploitation of CVE-2024-0532 could have serious consequences. Tenda routers like the A15 are commonly used in small to medium-sized enterprises and residential environments across Europe. A successful attack could lead to full compromise of the router, enabling attackers to intercept sensitive communications, inject malicious traffic, or establish persistent footholds inside corporate or home networks. This could result in data breaches, disruption of business operations, or use of compromised routers as part of botnets for further attacks. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this device. Additionally, the vulnerability’s remote and unauthenticated nature means attackers can exploit it over the internet without needing internal access, broadening the attack surface. Given the critical role routers play in network security, exploitation could undermine perimeter defenses and impact confidentiality, integrity, and availability of network resources.
Mitigation Recommendations
Since no official patch or update is currently available from Tenda, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the router’s web management interface by limiting it to trusted internal IP addresses or disabling remote management entirely if not required. 2) Employing network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 3) Monitoring network traffic for unusual activity or signs of exploitation attempts targeting the /goform/WifiExtraSet endpoint. 4) Considering replacement of affected Tenda A15 devices with alternative routers from vendors with active security support and patching. 5) Applying strict firewall rules to block unauthorized inbound connections to router management ports. 6) Educating users and administrators about the risks and signs of router compromise. Once a vendor patch becomes available, prompt testing and deployment should be prioritized. Additionally, organizations should maintain up-to-date inventories of network devices to quickly identify affected models.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0532: Stack-based Buffer Overflow in Tenda A15
Description
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0532 is a critical stack-based buffer overflow vulnerability found in the Tenda A15 router, specifically in version 15.13.07.13 of its firmware. The flaw exists in the web-based management interface component, within the function set_repeat5 located in the /goform/WifiExtraSet endpoint. The vulnerability arises from improper handling of the input parameters wpapsk_crypto2_4g and wpapsk_crypto5g, which can be manipulated remotely by an unauthenticated attacker to cause a stack-based buffer overflow. This type of overflow can lead to arbitrary code execution on the device, potentially allowing an attacker to fully compromise the router. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the vendor Tenda was contacted early regarding this issue, no response or patch has been provided as of the publication date. The CVSS v4.0 score is 8.6 (high severity), reflecting the vulnerability’s ease of exploitation (network attack vector, low attack complexity), and its significant impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but the public disclosure of the exploit code increases the likelihood of imminent attacks. This vulnerability threatens the security of the router’s management interface, potentially allowing attackers to take control of the device, intercept or manipulate network traffic, or pivot into internal networks protected by the router.
Potential Impact
For European organizations, the exploitation of CVE-2024-0532 could have serious consequences. Tenda routers like the A15 are commonly used in small to medium-sized enterprises and residential environments across Europe. A successful attack could lead to full compromise of the router, enabling attackers to intercept sensitive communications, inject malicious traffic, or establish persistent footholds inside corporate or home networks. This could result in data breaches, disruption of business operations, or use of compromised routers as part of botnets for further attacks. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this device. Additionally, the vulnerability’s remote and unauthenticated nature means attackers can exploit it over the internet without needing internal access, broadening the attack surface. Given the critical role routers play in network security, exploitation could undermine perimeter defenses and impact confidentiality, integrity, and availability of network resources.
Mitigation Recommendations
Since no official patch or update is currently available from Tenda, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the router’s web management interface by limiting it to trusted internal IP addresses or disabling remote management entirely if not required. 2) Employing network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 3) Monitoring network traffic for unusual activity or signs of exploitation attempts targeting the /goform/WifiExtraSet endpoint. 4) Considering replacement of affected Tenda A15 devices with alternative routers from vendors with active security support and patching. 5) Applying strict firewall rules to block unauthorized inbound connections to router management ports. 6) Educating users and administrators about the risks and signs of router compromise. Once a vendor patch becomes available, prompt testing and deployment should be prioritized. Additionally, organizations should maintain up-to-date inventories of network devices to quickly identify affected models.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-14T16:44:16.404Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aeca23
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 3:39:31 PM
Last updated: 7/31/2025, 10:47:24 AM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.