CVE-2024-30645: n/a
Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.
AI Analysis
Technical Summary
CVE-2024-30645 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.20_multi. The vulnerability arises from improper sanitization of the deviceName parameter, which is used in system commands. An attacker with low privileges and network access can inject arbitrary shell commands through this parameter, leading to remote code execution on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits or patches are currently available, the flaw allows attackers to fully compromise the router, potentially intercepting or manipulating network traffic, deploying malware, or disrupting network services. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, increasing the risk of exploitation in less-secure network segments.
Potential Impact
The impact of CVE-2024-30645 is significant for organizations and individuals relying on Tenda AC15 routers. Successful exploitation can lead to full device compromise, allowing attackers to execute arbitrary commands with system-level privileges. This can result in interception of sensitive data, network traffic manipulation, creation of persistent backdoors, disruption of network availability, and lateral movement within the network. Given the router's role as a gateway device, attackers can leverage this vulnerability to pivot into internal networks, compromising additional systems. The lack of authentication barriers and no requirement for user interaction lowers the barrier for exploitation, especially in environments where the attacker has adjacent network access, such as compromised Wi-Fi or LAN segments. This vulnerability poses a critical risk to confidentiality, integrity, and availability of network communications and connected devices.
Mitigation Recommendations
To mitigate CVE-2024-30645, organizations should immediately restrict network access to the Tenda AC15 routers by segmenting them from untrusted or guest networks and limiting management interfaces to trusted administrators only. Disable remote management features if enabled. Monitor network traffic for unusual command injection attempts or unexpected device behavior. Employ network intrusion detection systems (NIDS) with signatures targeting command injection patterns. Since no official patches are currently available, consider replacing vulnerable devices with models from vendors that provide timely security updates. Additionally, enforce strong network access controls and use VPNs or secure tunnels for remote management. Regularly audit router configurations and firmware versions to detect unauthorized changes. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once released.
Affected Countries
China, India, Russia, Brazil, Indonesia, United States, Vietnam, Thailand, Mexico, South Africa
CVE-2024-30645: n/a
Description
Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30645 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.20_multi. The vulnerability arises from improper sanitization of the deviceName parameter, which is used in system commands. An attacker with low privileges and network access can inject arbitrary shell commands through this parameter, leading to remote code execution on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits or patches are currently available, the flaw allows attackers to fully compromise the router, potentially intercepting or manipulating network traffic, deploying malware, or disrupting network services. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, increasing the risk of exploitation in less-secure network segments.
Potential Impact
The impact of CVE-2024-30645 is significant for organizations and individuals relying on Tenda AC15 routers. Successful exploitation can lead to full device compromise, allowing attackers to execute arbitrary commands with system-level privileges. This can result in interception of sensitive data, network traffic manipulation, creation of persistent backdoors, disruption of network availability, and lateral movement within the network. Given the router's role as a gateway device, attackers can leverage this vulnerability to pivot into internal networks, compromising additional systems. The lack of authentication barriers and no requirement for user interaction lowers the barrier for exploitation, especially in environments where the attacker has adjacent network access, such as compromised Wi-Fi or LAN segments. This vulnerability poses a critical risk to confidentiality, integrity, and availability of network communications and connected devices.
Mitigation Recommendations
To mitigate CVE-2024-30645, organizations should immediately restrict network access to the Tenda AC15 routers by segmenting them from untrusted or guest networks and limiting management interfaces to trusted administrators only. Disable remote management features if enabled. Monitor network traffic for unusual command injection attempts or unexpected device behavior. Employ network intrusion detection systems (NIDS) with signatures targeting command injection patterns. Since no official patches are currently available, consider replacing vulnerable devices with models from vendors that provide timely security updates. Additionally, enforce strong network access controls and use VPNs or secure tunnels for remote management. Regularly audit router configurations and firmware versions to detect unauthorized changes. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once released.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dc5b7ef31ef0b58dee9
Added to database: 2/25/2026, 9:46:45 PM
Last enriched: 2/26/2026, 1:57:09 PM
Last updated: 4/12/2026, 5:13:30 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.