Skip to main content

CVE-2024-0929: CWE-121 Stack-based Buffer Overflow in Tenda AC10U

Medium
VulnerabilityCVE-2024-0929cvecve-2024-0929cwe-121
Published: Fri Jan 26 2024 (01/26/2024, 16:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC10U

Description

A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:42:08 UTC

Technical Analysis

CVE-2024-0929 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router, specifically affecting firmware version 15.03.06.49_multi_TDE01. The vulnerability resides in the function fromNatStaticSetting, where improper handling and manipulation of the 'page' argument leads to a stack-based buffer overflow condition. This type of vulnerability occurs when data exceeding the buffer's boundary is written to the stack, potentially overwriting adjacent memory and control data such as return addresses. Exploiting this flaw could allow an attacker to execute arbitrary code, cause a denial of service (DoS) by crashing the device, or alter the device's behavior. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require high privileges (PR:H), indicating that the attacker must have some form of authenticated access to the device's management interface or network segment. The CVSS v3.1 base score is 4.7 (medium severity), reflecting the requirement for authentication and the limited confidentiality, integrity, and availability impacts. The vendor, Tenda, was contacted but did not respond or issue a patch at the time of disclosure, and no official patch links are available. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability and technical details increases the risk of exploitation by attackers. The affected product, Tenda AC10U, is a consumer-grade wireless router commonly used in home and small office environments. The vulnerability's exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network connectivity.

Potential Impact

For European organizations, especially small businesses and home offices relying on Tenda AC10U routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control of network infrastructure, enabling attackers to intercept sensitive communications, inject malicious traffic, or pivot into internal networks. This could compromise confidentiality and integrity of data and disrupt availability of network services. Given the medium CVSS score, the impact is somewhat mitigated by the requirement for authentication, but in environments where default or weak credentials are used, the risk escalates. Additionally, the lack of vendor response and patch availability increases exposure time. Critical infrastructure operators or enterprises using these routers in branch offices may face operational disruptions or data breaches. The vulnerability also poses a risk to privacy compliance under GDPR if personal data is intercepted or manipulated. The potential for denial of service could affect business continuity, especially for organizations with limited IT support to quickly remediate or replace affected devices.

Mitigation Recommendations

Organizations should immediately audit their network to identify any Tenda AC10U devices running the affected firmware version 15.03.06.49_multi_TDE01. Since no official patch is available, mitigation should focus on reducing exposure: 1) Restrict access to the router's management interface to trusted internal networks only, using firewall rules or VLAN segmentation. 2) Enforce strong, unique administrative credentials to prevent unauthorized authentication. 3) Disable remote management features if not required, especially WAN-side access. 4) Monitor network traffic for unusual activity indicative of exploitation attempts. 5) Consider replacing affected devices with alternative models from vendors with active security support. 6) If possible, implement network-level intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting this vulnerability. 7) Maintain up-to-date inventory and documentation of network devices to enable rapid response. 8) Educate users and administrators about the risks of default credentials and the importance of firmware updates. Given the vendor's lack of response, organizations should also engage with Tenda support channels and monitor for any future patches or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-26T08:21:50.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387d4f182aa0cae28316d5

Added to database: 5/29/2025, 3:29:19 PM

Last enriched: 7/7/2025, 11:42:08 PM

Last updated: 7/31/2025, 10:04:36 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats