CVE-2024-0931: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0931 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router firmware version 15.03.06.49_multi_TDE01. The flaw exists within the function saveParentControlInfo, which processes input parameters such as deviceId, time, and urls. Improper handling and validation of these arguments allow an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This type of vulnerability can lead to arbitrary code execution, denial of service, or system instability. The vulnerability is remotely exploitable without user interaction, but requires high privileges (PR:H) on the device to initiate the attack. The vendor was notified but has not responded or released a patch, and no known exploits are currently observed in the wild. The CVSS v3.1 base score is 4.7 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and impact on confidentiality, integrity, and availability as low to medium. The vulnerability falls under CWE-121, a classic stack-based buffer overflow, which is a well-known and dangerous class of software bugs. Given the router’s role as a network gateway device, exploitation could allow attackers to compromise the device, intercept or manipulate network traffic, or pivot into internal networks.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment scale of Tenda AC10U routers within their infrastructure. If used in enterprise or SME environments, successful exploitation could lead to compromise of network perimeter devices, enabling attackers to intercept sensitive communications, disrupt network availability, or establish persistent footholds. This could affect confidentiality and integrity of data, as well as availability of network services. In home or small office environments, exploitation could similarly compromise user privacy and network security. The lack of vendor response and patch availability increases risk, as organizations cannot remediate through official updates. Attackers with network access and elevated privileges could exploit this vulnerability remotely, potentially leading to lateral movement within corporate networks. Given the medium CVSS score, the vulnerability is not trivial but still poses a meaningful risk, especially in environments where these routers are widely deployed and not segmented from critical assets.
Mitigation Recommendations
Since no official patch is available, European organizations should take immediate compensating controls: 1) Identify and inventory all Tenda AC10U devices running the affected firmware version. 2) Restrict administrative access to these routers to trusted internal networks and limit remote management interfaces. 3) Employ network segmentation to isolate vulnerable devices from sensitive internal systems. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the saveParentControlInfo function or related parameters. 5) Consider replacing affected devices with models from vendors with active security support if patching is not forthcoming. 6) Implement strict access control policies and multi-factor authentication for device management to reduce the risk of privilege escalation. 7) Regularly review and update firewall rules to minimize exposure of management interfaces to untrusted networks. 8) Stay alert for any future vendor advisories or community patches addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0931: CWE-121 Stack-based Buffer Overflow in Tenda AC10U
Description
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0931 is a stack-based buffer overflow vulnerability identified in the Tenda AC10U router firmware version 15.03.06.49_multi_TDE01. The flaw exists within the function saveParentControlInfo, which processes input parameters such as deviceId, time, and urls. Improper handling and validation of these arguments allow an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This type of vulnerability can lead to arbitrary code execution, denial of service, or system instability. The vulnerability is remotely exploitable without user interaction, but requires high privileges (PR:H) on the device to initiate the attack. The vendor was notified but has not responded or released a patch, and no known exploits are currently observed in the wild. The CVSS v3.1 base score is 4.7 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and impact on confidentiality, integrity, and availability as low to medium. The vulnerability falls under CWE-121, a classic stack-based buffer overflow, which is a well-known and dangerous class of software bugs. Given the router’s role as a network gateway device, exploitation could allow attackers to compromise the device, intercept or manipulate network traffic, or pivot into internal networks.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment scale of Tenda AC10U routers within their infrastructure. If used in enterprise or SME environments, successful exploitation could lead to compromise of network perimeter devices, enabling attackers to intercept sensitive communications, disrupt network availability, or establish persistent footholds. This could affect confidentiality and integrity of data, as well as availability of network services. In home or small office environments, exploitation could similarly compromise user privacy and network security. The lack of vendor response and patch availability increases risk, as organizations cannot remediate through official updates. Attackers with network access and elevated privileges could exploit this vulnerability remotely, potentially leading to lateral movement within corporate networks. Given the medium CVSS score, the vulnerability is not trivial but still poses a meaningful risk, especially in environments where these routers are widely deployed and not segmented from critical assets.
Mitigation Recommendations
Since no official patch is available, European organizations should take immediate compensating controls: 1) Identify and inventory all Tenda AC10U devices running the affected firmware version. 2) Restrict administrative access to these routers to trusted internal networks and limit remote management interfaces. 3) Employ network segmentation to isolate vulnerable devices from sensitive internal systems. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the saveParentControlInfo function or related parameters. 5) Consider replacing affected devices with models from vendors with active security support if patching is not forthcoming. 6) Implement strict access control policies and multi-factor authentication for device management to reduce the risk of privilege escalation. 7) Regularly review and update firewall rules to minimize exposure of management interfaces to untrusted networks. 8) Stay alert for any future vendor advisories or community patches addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-26T08:22:09.387Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f3b5c182aa0cae287157a
Added to database: 6/3/2025, 6:13:48 PM
Last enriched: 7/4/2025, 11:27:19 AM
Last updated: 8/13/2025, 9:40:00 AM
Views: 14
Related Threats
CVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8898: CWE-862 Missing Authorization in magepeopleteam E-cab Taxi Booking Manager for Woocommerce
CriticalCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.