CVE-2024-0926: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0926 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The flaw resides in the function formWifiWpsOOB, where improper handling of the 'index' argument allows an attacker to overwrite the stack memory. This vulnerability can be triggered remotely without user interaction, making it a significant risk. Although the CVSS score is rated medium (4.7), the vulnerability impacts confidentiality, integrity, and availability due to the potential for arbitrary code execution or denial of service. The vulnerability is classified under CWE-121, which relates to stack-based buffer overflows, a common and dangerous class of software errors. The vendor, Tenda, was contacted but did not respond or provide a patch at the time of disclosure. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability requires high privileges (PR:H) to exploit, which may limit the attack surface somewhat, but the remote attack vector (AV:N) and lack of required user interaction (UI:N) still make it a concern for exposed devices. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda AC10U routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to network compromise, interception of sensitive data, or disruption of network services. This could affect confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or denial of service. Given the remote exploitability and absence of user interaction, attackers could target these routers en masse, potentially affecting home offices, small businesses, or branch offices using this device. The lack of vendor response and patch availability increases the risk for European entities, as they may need to rely on network-level mitigations or device replacement. Additionally, the medium CVSS score may underestimate the real-world impact if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Since no official patch is available, European organizations should implement specific mitigations: 1) Isolate Tenda AC10U devices from direct internet exposure by placing them behind firewalls or using network segmentation to limit remote access to the vulnerable function. 2) Disable WPS functionality if possible, as the vulnerability is in the WPS-related function formWifiWpsOOB, reducing the attack surface. 3) Monitor network traffic for unusual activity targeting the router, especially malformed packets attempting to exploit the index parameter. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against Tenda routers. 5) Consider replacing affected devices with alternative models from vendors with active security support if patching is not forthcoming. 6) Maintain up-to-date inventories of network devices to quickly identify and remediate vulnerable units. 7) Restrict administrative access to the device to trusted internal networks and use strong authentication mechanisms to prevent privilege escalation required for exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0926: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
Description
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0926 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The flaw resides in the function formWifiWpsOOB, where improper handling of the 'index' argument allows an attacker to overwrite the stack memory. This vulnerability can be triggered remotely without user interaction, making it a significant risk. Although the CVSS score is rated medium (4.7), the vulnerability impacts confidentiality, integrity, and availability due to the potential for arbitrary code execution or denial of service. The vulnerability is classified under CWE-121, which relates to stack-based buffer overflows, a common and dangerous class of software errors. The vendor, Tenda, was contacted but did not respond or provide a patch at the time of disclosure. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability requires high privileges (PR:H) to exploit, which may limit the attack surface somewhat, but the remote attack vector (AV:N) and lack of required user interaction (UI:N) still make it a concern for exposed devices. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda AC10U routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to network compromise, interception of sensitive data, or disruption of network services. This could affect confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or denial of service. Given the remote exploitability and absence of user interaction, attackers could target these routers en masse, potentially affecting home offices, small businesses, or branch offices using this device. The lack of vendor response and patch availability increases the risk for European entities, as they may need to rely on network-level mitigations or device replacement. Additionally, the medium CVSS score may underestimate the real-world impact if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Since no official patch is available, European organizations should implement specific mitigations: 1) Isolate Tenda AC10U devices from direct internet exposure by placing them behind firewalls or using network segmentation to limit remote access to the vulnerable function. 2) Disable WPS functionality if possible, as the vulnerability is in the WPS-related function formWifiWpsOOB, reducing the attack surface. 3) Monitor network traffic for unusual activity targeting the router, especially malformed packets attempting to exploit the index parameter. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against Tenda routers. 5) Consider replacing affected devices with alternative models from vendors with active security support if patching is not forthcoming. 6) Maintain up-to-date inventories of network devices to quickly identify and remediate vulnerable units. 7) Restrict administrative access to the device to trusted internal networks and use strong authentication mechanisms to prevent privilege escalation required for exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-26T08:21:22.724Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316d1
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:41:31 PM
Last updated: 12/2/2025, 2:19:50 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13724: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in e4jvikwp VikRentCar Car Rental Management System
HighCVE-2025-13534: CWE-269 Improper Privilege Management in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2025-13516: CWE-434 Unrestricted Upload of File with Dangerous Type in brainstormforce SureMail – SMTP and Email Logs Plugin with Amazon SES, Postmark, and Other Providers
HighCVE-2025-41744: CWE-1394 Use of Default Cryptographic Key in Sprecher Automation SPRECON-E-C
CriticalCVE-2025-41743: CWE-326 Inadequate Encryption Strength in Sprecher Automation SPRECON-E-C
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.