CVE-2024-0929: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0929 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The vulnerability resides in the function fromNatStaticSetting, where improper handling and manipulation of the 'page' argument leads to a stack-based buffer overflow condition. This type of vulnerability occurs when data exceeding the buffer's boundary is written to the stack, potentially overwriting adjacent memory and control data such as return addresses. Exploiting this flaw could allow an attacker to execute arbitrary code, cause a denial of service (DoS) by crashing the device, or alter the device's behavior. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require high privileges (PR:H), indicating that the attacker must have some form of authenticated access to the device's management interface or network segment. The CVSS v3.1 base score is 4.7 (medium severity), reflecting the requirement for authentication and the limited confidentiality, integrity, and availability impacts. The vendor, Tenda, was contacted but did not respond or issue a patch at the time of disclosure, and no official patch links are available. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability and technical details increases the risk of exploitation by attackers. The affected product, Tenda AC10U, is a consumer-grade wireless router commonly used in home and small office environments. The vulnerability's exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda AC10U routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control of network infrastructure, enabling attackers to intercept sensitive communications, inject malicious traffic, or pivot into internal networks. This could compromise confidentiality and integrity of data and disrupt availability of network services. Given the medium CVSS score, the impact is somewhat mitigated by the requirement for authentication, but in environments where default or weak credentials are used, the risk escalates. Additionally, the lack of vendor response and patch availability increases exposure time. Critical infrastructure operators or enterprises using these routers in branch offices may face operational disruptions or data breaches. The vulnerability also poses a risk to privacy compliance under GDPR if personal data is intercepted or manipulated. The potential for denial of service could affect business continuity, especially for organizations with limited IT support to quickly remediate or replace affected devices.
Mitigation Recommendations
Organizations should immediately audit their network to identify any Tenda AC10U devices running the affected firmware version 15.03.06.49_multi_TDE01. Since no official patch is available, mitigation should focus on reducing exposure: 1) Restrict access to the router's management interface to trusted internal networks only, using firewall rules or VLAN segmentation. 2) Enforce strong, unique administrative credentials to prevent unauthorized authentication. 3) Disable remote management features if not required, especially WAN-side access. 4) Monitor network traffic for unusual activity indicative of exploitation attempts. 5) Consider replacing affected devices with alternative models from vendors with active security support. 6) If possible, implement network-level intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting this vulnerability. 7) Maintain up-to-date inventory and documentation of network devices to enable rapid response. 8) Educate users and administrators about the risks of default credentials and the importance of firmware updates. Given the vendor's lack of response, organizations should also engage with Tenda support channels and monitor for any future patches or advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0929: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
Description
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0929 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The vulnerability resides in the function fromNatStaticSetting, where improper handling and manipulation of the 'page' argument leads to a stack-based buffer overflow condition. This type of vulnerability occurs when data exceeding the buffer's boundary is written to the stack, potentially overwriting adjacent memory and control data such as return addresses. Exploiting this flaw could allow an attacker to execute arbitrary code, cause a denial of service (DoS) by crashing the device, or alter the device's behavior. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require high privileges (PR:H), indicating that the attacker must have some form of authenticated access to the device's management interface or network segment. The CVSS v3.1 base score is 4.7 (medium severity), reflecting the requirement for authentication and the limited confidentiality, integrity, and availability impacts. The vendor, Tenda, was contacted but did not respond or issue a patch at the time of disclosure, and no official patch links are available. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability and technical details increases the risk of exploitation by attackers. The affected product, Tenda AC10U, is a consumer-grade wireless router commonly used in home and small office environments. The vulnerability's exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda AC10U routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control of network infrastructure, enabling attackers to intercept sensitive communications, inject malicious traffic, or pivot into internal networks. This could compromise confidentiality and integrity of data and disrupt availability of network services. Given the medium CVSS score, the impact is somewhat mitigated by the requirement for authentication, but in environments where default or weak credentials are used, the risk escalates. Additionally, the lack of vendor response and patch availability increases exposure time. Critical infrastructure operators or enterprises using these routers in branch offices may face operational disruptions or data breaches. The vulnerability also poses a risk to privacy compliance under GDPR if personal data is intercepted or manipulated. The potential for denial of service could affect business continuity, especially for organizations with limited IT support to quickly remediate or replace affected devices.
Mitigation Recommendations
Organizations should immediately audit their network to identify any Tenda AC10U devices running the affected firmware version 15.03.06.49_multi_TDE01. Since no official patch is available, mitigation should focus on reducing exposure: 1) Restrict access to the router's management interface to trusted internal networks only, using firewall rules or VLAN segmentation. 2) Enforce strong, unique administrative credentials to prevent unauthorized authentication. 3) Disable remote management features if not required, especially WAN-side access. 4) Monitor network traffic for unusual activity indicative of exploitation attempts. 5) Consider replacing affected devices with alternative models from vendors with active security support. 6) If possible, implement network-level intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting this vulnerability. 7) Maintain up-to-date inventory and documentation of network devices to enable rapid response. 8) Educate users and administrators about the risks of default credentials and the importance of firmware updates. Given the vendor's lack of response, organizations should also engage with Tenda support channels and monitor for any future patches or advisories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-26T08:21:50.632Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316d5
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:42:08 PM
Last updated: 7/31/2025, 10:04:36 PM
Views: 15
Related Threats
CVE-2025-8833: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-7965: CWE-352 Cross-Site Request Forgery (CSRF) in CBX Restaurant Booking
MediumCVE-2025-8832: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8831: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8829: OS Command Injection in Linksys RE6250
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.