Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25746: n/a

0
High
VulnerabilityCVE-2024-25746cvecve-2024-25746
Published: Thu Feb 22 2024 (02/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the add_white_node function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:51:55 UTC

Technical Analysis

CVE-2024-25746 is a stack-based buffer overflow vulnerability identified in the Tenda AC9 router running firmware version 15.03.06.42_multi. The vulnerability resides in the add_white_node function, which is likely involved in managing the router's whitelist of allowed devices or nodes. A stack-based buffer overflow occurs when more data is written to a buffer located on the stack than it can hold, overwriting adjacent memory and potentially allowing arbitrary code execution. This vulnerability can be triggered remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The attacker can exploit this flaw to execute arbitrary code with the privileges of the router's firmware process, which typically runs with high system privileges. This can lead to full device compromise, allowing attackers to manipulate router configurations, intercept or redirect network traffic, deploy malware, or use the device as a foothold for further attacks within the internal network. The vulnerability has a high CVSS score of 8.8, reflecting its critical impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the presence of such a severe flaw in a widely used consumer router model poses a significant risk. The lack of an available patch at the time of disclosure increases the urgency for affected users to implement interim mitigations. The CWE-121 classification confirms the nature of the vulnerability as a classic stack-based buffer overflow, a well-understood and highly exploitable class of bugs. Given the widespread use of Tenda routers in various regions, this vulnerability could be leveraged in targeted or broad attacks against home and small business networks.

Potential Impact

The impact of CVE-2024-25746 is substantial for organizations and individuals using the Tenda AC9 router. Successful exploitation allows remote attackers to execute arbitrary code with high privileges, leading to complete compromise of the device. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and deployment of persistent malware. For enterprises relying on these routers in branch offices or remote locations, this vulnerability could serve as an entry point for lateral movement and further network infiltration. The compromise of network infrastructure devices like routers undermines the foundational security of affected environments, potentially exposing connected systems and data to attackers. Additionally, the lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks once exploit code becomes available. The absence of known exploits in the wild currently limits immediate widespread impact, but the high severity and ease of exploitation make this a critical threat to monitor. Organizations without timely patching or mitigations risk significant operational disruption and data breaches.

Mitigation Recommendations

1. Monitor Tenda's official channels for firmware updates addressing CVE-2024-25746 and apply patches immediately upon release. 2. Until patches are available, disable remote management interfaces on the Tenda AC9 router to prevent external exploitation. 3. Restrict network access to the router's management interfaces using firewall rules or network segmentation, limiting exposure to trusted internal IPs only. 4. Implement network monitoring and intrusion detection systems to detect anomalous traffic patterns or exploitation attempts targeting the add_white_node function or related router services. 5. Regularly audit router configurations and logs for signs of compromise or unauthorized changes. 6. Consider replacing vulnerable devices with models from vendors with a stronger security track record if patching is delayed. 7. Educate users and administrators about the risks of outdated firmware and the importance of timely updates. 8. Employ network segmentation to isolate critical systems from devices that may be vulnerable to router compromise. These steps go beyond generic advice by focusing on immediate risk reduction through access control and monitoring, alongside long-term patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6eb7ef31ef0b57219e

Added to database: 2/25/2026, 9:45:18 PM

Last enriched: 2/28/2026, 9:51:55 AM

Last updated: 4/12/2026, 5:07:25 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses