Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30645: n/a

0
High
VulnerabilityCVE-2024-30645cvecve-2024-30645
Published: Fri Mar 29 2024 (03/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:57:09 UTC

Technical Analysis

CVE-2024-30645 is a command injection vulnerability identified in the Tenda AC15V1.0 router firmware version V15.03.20_multi. The vulnerability arises from improper sanitization of the deviceName parameter, which is used in system commands. An attacker with low privileges and network access can inject arbitrary shell commands through this parameter, leading to remote code execution on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits or patches are currently available, the flaw allows attackers to fully compromise the router, potentially intercepting or manipulating network traffic, deploying malware, or disrupting network services. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, increasing the risk of exploitation in less-secure network segments.

Potential Impact

The impact of CVE-2024-30645 is significant for organizations and individuals relying on Tenda AC15 routers. Successful exploitation can lead to full device compromise, allowing attackers to execute arbitrary commands with system-level privileges. This can result in interception of sensitive data, network traffic manipulation, creation of persistent backdoors, disruption of network availability, and lateral movement within the network. Given the router's role as a gateway device, attackers can leverage this vulnerability to pivot into internal networks, compromising additional systems. The lack of authentication barriers and no requirement for user interaction lowers the barrier for exploitation, especially in environments where the attacker has adjacent network access, such as compromised Wi-Fi or LAN segments. This vulnerability poses a critical risk to confidentiality, integrity, and availability of network communications and connected devices.

Mitigation Recommendations

To mitigate CVE-2024-30645, organizations should immediately restrict network access to the Tenda AC15 routers by segmenting them from untrusted or guest networks and limiting management interfaces to trusted administrators only. Disable remote management features if enabled. Monitor network traffic for unusual command injection attempts or unexpected device behavior. Employ network intrusion detection systems (NIDS) with signatures targeting command injection patterns. Since no official patches are currently available, consider replacing vulnerable devices with models from vendors that provide timely security updates. Additionally, enforce strong network access controls and use VPNs or secure tunnels for remote management. Regularly audit router configurations and firmware versions to detect unauthorized changes. Engage with Tenda support channels to obtain information on forthcoming patches and apply them promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc5b7ef31ef0b58dee9

Added to database: 2/25/2026, 9:46:45 PM

Last enriched: 2/26/2026, 1:57:09 PM

Last updated: 4/12/2026, 5:13:30 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses