Skip to main content

CVE-2024-0541: CWE-121 Stack-based Buffer Overflow in Tenda W9

High
VulnerabilityCVE-2024-0541cvecve-2024-0541cwe-121
Published: Mon Jan 15 2024 (01/15/2024, 05:00:06 UTC)
Source: CVE
Vendor/Project: Tenda
Product: W9

Description

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Affected by this vulnerability is the function formAddSysLogRule of the component httpd. The manipulation of the argument sysRulenEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250711. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:57:51 UTC

Technical Analysis

CVE-2024-0541 is a critical security vulnerability identified in the Tenda W9 wireless router, specifically version 1.0.0.7(4456). The flaw resides in the httpd component's function formAddSysLogRule, where improper handling of the sysRulenEn argument leads to a stack-based buffer overflow (CWE-121). This type of vulnerability occurs when data exceeding the buffer's capacity is written to the stack, potentially overwriting adjacent memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without user interaction, requiring only low privileges (PR:L) on the device, which may be achievable through network access or weak authentication mechanisms. The CVSS 3.1 base score is 8.8, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). Although no patches or vendor responses have been published, the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of vendor engagement raises concerns about timely remediation. The vulnerability affects a widely deployed consumer and small office router model, which is often used as a gateway device, making it a valuable target for attackers aiming to compromise network infrastructure or launch further attacks within a network.

Potential Impact

For European organizations, the exploitation of CVE-2024-0541 could have significant consequences. The Tenda W9 router is commonly used in small and medium-sized enterprises (SMEs) and residential environments, which often have less mature security postures. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the router. This could result in interception or manipulation of network traffic, unauthorized access to internal networks, disruption of internet connectivity, and potential pivoting to other critical systems. Confidential data could be exfiltrated, and integrity of communications compromised. Availability could also be impacted through denial-of-service conditions caused by the overflow. Given the router’s role as a network gateway, the vulnerability could serve as an entry point for broader attacks, including ransomware or espionage campaigns targeting European businesses. The public disclosure of exploit details and absence of vendor patches increase the urgency for organizations to act swiftly to mitigate risks.

Mitigation Recommendations

Since no official patches are currently available and the vendor has not responded, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the router’s management interface to trusted IP addresses only, ideally via firewall rules or network segmentation, to prevent unauthorized remote exploitation. 2) Changing default credentials and enforcing strong, unique passwords to reduce the risk of privilege escalation. 3) Disabling remote management features if not strictly necessary. 4) Monitoring network traffic for unusual activity or signs of exploitation attempts targeting the sysRulenEn parameter or httpd service. 5) Considering temporary replacement of affected devices with alternative models from vendors with active security support. 6) Applying network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 7) Keeping an eye on threat intelligence feeds for emerging exploit activity and vendor updates. 8) Planning for a firmware upgrade or device replacement once a patch is released. These steps go beyond generic advice by focusing on access control, monitoring, and device lifecycle management tailored to this specific vulnerability and product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-14T17:22:14.167Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6da7

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:57:51 PM

Last updated: 7/29/2025, 9:11:17 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats