CVE-2024-0926: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0926 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The flaw resides in the function formWifiWpsOOB, where improper handling of the 'index' argument allows an attacker to overwrite the stack memory. This vulnerability can be triggered remotely without user interaction, making it a significant risk. Although the CVSS score is rated medium (4.7), the vulnerability impacts confidentiality, integrity, and availability due to the potential for arbitrary code execution or denial of service. The vulnerability is classified under CWE-121, which relates to stack-based buffer overflows, a common and dangerous class of software errors. The vendor, Tenda, was contacted but did not respond or provide a patch at the time of disclosure. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability requires high privileges (PR:H) to exploit, which may limit the attack surface somewhat, but the remote attack vector (AV:N) and lack of required user interaction (UI:N) still make it a concern for exposed devices. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda AC10U routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to network compromise, interception of sensitive data, or disruption of network services. This could affect confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or denial of service. Given the remote exploitability and absence of user interaction, attackers could target these routers en masse, potentially affecting home offices, small businesses, or branch offices using this device. The lack of vendor response and patch availability increases the risk for European entities, as they may need to rely on network-level mitigations or device replacement. Additionally, the medium CVSS score may underestimate the real-world impact if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Since no official patch is available, European organizations should implement specific mitigations: 1) Isolate Tenda AC10U devices from direct internet exposure by placing them behind firewalls or using network segmentation to limit remote access to the vulnerable function. 2) Disable WPS functionality if possible, as the vulnerability is in the WPS-related function formWifiWpsOOB, reducing the attack surface. 3) Monitor network traffic for unusual activity targeting the router, especially malformed packets attempting to exploit the index parameter. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against Tenda routers. 5) Consider replacing affected devices with alternative models from vendors with active security support if patching is not forthcoming. 6) Maintain up-to-date inventories of network devices to quickly identify and remediate vulnerable units. 7) Restrict administrative access to the device to trusted internal networks and use strong authentication mechanisms to prevent privilege escalation required for exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0926: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
Description
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0926 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The flaw resides in the function formWifiWpsOOB, where improper handling of the 'index' argument allows an attacker to overwrite the stack memory. This vulnerability can be triggered remotely without user interaction, making it a significant risk. Although the CVSS score is rated medium (4.7), the vulnerability impacts confidentiality, integrity, and availability due to the potential for arbitrary code execution or denial of service. The vulnerability is classified under CWE-121, which relates to stack-based buffer overflows, a common and dangerous class of software errors. The vendor, Tenda, was contacted but did not respond or provide a patch at the time of disclosure. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability requires high privileges (PR:H) to exploit, which may limit the attack surface somewhat, but the remote attack vector (AV:N) and lack of required user interaction (UI:N) still make it a concern for exposed devices. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda AC10U routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to network compromise, interception of sensitive data, or disruption of network services. This could affect confidentiality by exposing internal communications, integrity by allowing manipulation of network traffic or device configurations, and availability by causing device crashes or denial of service. Given the remote exploitability and absence of user interaction, attackers could target these routers en masse, potentially affecting home offices, small businesses, or branch offices using this device. The lack of vendor response and patch availability increases the risk for European entities, as they may need to rely on network-level mitigations or device replacement. Additionally, the medium CVSS score may underestimate the real-world impact if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Since no official patch is available, European organizations should implement specific mitigations: 1) Isolate Tenda AC10U devices from direct internet exposure by placing them behind firewalls or using network segmentation to limit remote access to the vulnerable function. 2) Disable WPS functionality if possible, as the vulnerability is in the WPS-related function formWifiWpsOOB, reducing the attack surface. 3) Monitor network traffic for unusual activity targeting the router, especially malformed packets attempting to exploit the index parameter. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against Tenda routers. 5) Consider replacing affected devices with alternative models from vendors with active security support if patching is not forthcoming. 6) Maintain up-to-date inventories of network devices to quickly identify and remediate vulnerable units. 7) Restrict administrative access to the device to trusted internal networks and use strong authentication mechanisms to prevent privilege escalation required for exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-26T08:21:22.724Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316d1
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:41:31 PM
Last updated: 8/15/2025, 3:59:25 AM
Views: 15
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.