Skip to main content

CVE-2024-0542: CWE-121 Stack-based Buffer Overflow in Tenda W9

High
VulnerabilityCVE-2024-0542cvecve-2024-0542cwe-121
Published: Mon Jan 15 2024 (01/15/2024, 05:00:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: W9

Description

A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affected by this issue is the function formWifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250712. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:17:54 UTC

Technical Analysis

CVE-2024-0542 is a critical stack-based buffer overflow vulnerability identified in the Tenda W9 router, specifically in version 1.0.0.7(4456). The flaw exists in the function formWifiMacFilterGet within the httpd component of the device's firmware. This vulnerability arises from improper handling of the 'index' argument, which can be manipulated by an attacker to cause a buffer overflow on the stack. Such a condition can lead to arbitrary code execution, potentially allowing an attacker to gain control over the device remotely without requiring user interaction. The vulnerability has been publicly disclosed, and although no known exploits are currently observed in the wild, the availability of exploit details increases the risk of imminent exploitation. The vendor, Tenda, has not responded to early disclosure attempts, and no patches have been released to date. The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. This vulnerability falls under CWE-121, a classic stack-based buffer overflow, which is a well-understood and dangerous class of software bugs that can lead to full system compromise.

Potential Impact

For European organizations, the exploitation of this vulnerability could have significant consequences. Tenda W9 routers are commonly used in small to medium-sized enterprises and residential environments, often serving as gateways to corporate or home networks. Successful exploitation could allow attackers to execute arbitrary code on the router, leading to full device compromise. This could result in interception or manipulation of network traffic, disruption of internet connectivity, or the router being used as a foothold for lateral movement within internal networks. Confidential data passing through the device could be exposed or altered, and availability of network services could be disrupted, impacting business operations. Given the critical nature of the vulnerability and the lack of a vendor patch, European organizations using Tenda W9 devices are at heightened risk, especially those with limited network segmentation or monitoring capabilities.

Mitigation Recommendations

Immediate mitigation steps should include isolating affected Tenda W9 devices from critical network segments to limit potential impact. Network administrators should implement strict access controls to restrict management interface access to trusted IP addresses only, ideally via VPN or secure management networks. Monitoring network traffic for unusual patterns or signs of exploitation attempts targeting the httpd service on these devices is essential. Since no official patch is available, organizations should consider replacing vulnerable Tenda W9 routers with devices from vendors that provide timely security updates. If replacement is not immediately feasible, disabling or restricting the vulnerable httpd component, if possible, may reduce exposure. Additionally, applying network-level protections such as intrusion prevention systems (IPS) with signatures for buffer overflow attempts targeting Tenda devices can help detect and block exploitation attempts. Regularly reviewing device firmware and vendor communications for updates is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-14T17:22:18.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5b1b0bd07c3938c89c

Added to database: 6/10/2025, 6:54:19 PM

Last enriched: 7/10/2025, 10:17:54 PM

Last updated: 7/26/2025, 3:35:40 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats