Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41630: n/a

0
High
VulnerabilityCVE-2024-41630cvecve-2024-41630
Published: Wed Jul 31 2024 (07/31/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:50:36 UTC

Technical Analysis

CVE-2024-41630 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.3.10_EN. The flaw exists in the handling of the ssid parameter within the ip/goform/fast_setting_wifi_set endpoint, which is part of the router's web management interface. An attacker with low privileges can send a specially crafted HTTP request to this endpoint, causing a buffer overflow on the stack. This overflow can overwrite the return address or other control data, enabling arbitrary code execution remotely on the device. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS 3.1 base score is 7.6, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L, indicating network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality (low), integrity (high), and availability (low). No patches or official fixes have been linked yet, and no known exploits are reported in the wild as of the publication date. This vulnerability could allow attackers to gain control over the router, manipulate network traffic, or pivot into internal networks.

Potential Impact

The primary impact of this vulnerability is the potential for remote code execution on affected Tenda AC18 routers, which can lead to full compromise of the device. Attackers could alter router configurations, intercept or redirect network traffic, deploy malware, or use the device as a foothold for further attacks within an organization's network. The integrity of network communications is at high risk, while confidentiality and availability are also affected but to a lesser extent. Organizations relying on this router model for home or small office networks may face significant security risks, including data breaches, unauthorized access, and network disruptions. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's nature and ease of exploitation (low complexity, no user interaction) make it a critical concern once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately identify any Tenda AC18 routers running firmware version V15.03.3.10_EN and restrict access to the router's management interface, ideally limiting it to trusted internal networks. Network segmentation can reduce exposure. Monitoring network traffic for unusual requests to the ip/goform/fast_setting_wifi_set endpoint may help detect exploitation attempts. Since no official patches are currently available, contacting Tenda support for firmware updates or advisories is recommended. As a temporary measure, disabling remote management or changing default credentials can reduce risk. Additionally, deploying network intrusion detection systems (NIDS) with custom signatures targeting malformed ssid parameter requests can provide early warning. Organizations should plan to update firmware promptly once a patch is released and consider replacing vulnerable devices if timely updates are not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbdb7ef31ef0b56895e

Added to database: 2/25/2026, 9:42:21 PM

Last enriched: 2/28/2026, 5:50:36 AM

Last updated: 4/11/2026, 5:56:36 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses