CVE-2024-41630: n/a
Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.
AI Analysis
Technical Summary
CVE-2024-41630 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.3.10_EN. The flaw exists in the handling of the ssid parameter within the ip/goform/fast_setting_wifi_set endpoint, which is part of the router's web management interface. An attacker with low privileges can send a specially crafted HTTP request to this endpoint, causing a buffer overflow on the stack. This overflow can overwrite the return address or other control data, enabling arbitrary code execution remotely on the device. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS 3.1 base score is 7.6, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L, indicating network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality (low), integrity (high), and availability (low). No patches or official fixes have been linked yet, and no known exploits are reported in the wild as of the publication date. This vulnerability could allow attackers to gain control over the router, manipulate network traffic, or pivot into internal networks.
Potential Impact
The primary impact of this vulnerability is the potential for remote code execution on affected Tenda AC18 routers, which can lead to full compromise of the device. Attackers could alter router configurations, intercept or redirect network traffic, deploy malware, or use the device as a foothold for further attacks within an organization's network. The integrity of network communications is at high risk, while confidentiality and availability are also affected but to a lesser extent. Organizations relying on this router model for home or small office networks may face significant security risks, including data breaches, unauthorized access, and network disruptions. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's nature and ease of exploitation (low complexity, no user interaction) make it a critical concern once exploit code becomes available.
Mitigation Recommendations
Organizations should immediately identify any Tenda AC18 routers running firmware version V15.03.3.10_EN and restrict access to the router's management interface, ideally limiting it to trusted internal networks. Network segmentation can reduce exposure. Monitoring network traffic for unusual requests to the ip/goform/fast_setting_wifi_set endpoint may help detect exploitation attempts. Since no official patches are currently available, contacting Tenda support for firmware updates or advisories is recommended. As a temporary measure, disabling remote management or changing default credentials can reduce risk. Additionally, deploying network intrusion detection systems (NIDS) with custom signatures targeting malformed ssid parameter requests can provide early warning. Organizations should plan to update firmware promptly once a patch is released and consider replacing vulnerable devices if timely updates are not feasible.
Affected Countries
United States, China, India, Brazil, Russia, Germany, United Kingdom, France, Australia, Canada
CVE-2024-41630: n/a
Description
Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-41630 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.3.10_EN. The flaw exists in the handling of the ssid parameter within the ip/goform/fast_setting_wifi_set endpoint, which is part of the router's web management interface. An attacker with low privileges can send a specially crafted HTTP request to this endpoint, causing a buffer overflow on the stack. This overflow can overwrite the return address or other control data, enabling arbitrary code execution remotely on the device. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS 3.1 base score is 7.6, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L, indicating network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality (low), integrity (high), and availability (low). No patches or official fixes have been linked yet, and no known exploits are reported in the wild as of the publication date. This vulnerability could allow attackers to gain control over the router, manipulate network traffic, or pivot into internal networks.
Potential Impact
The primary impact of this vulnerability is the potential for remote code execution on affected Tenda AC18 routers, which can lead to full compromise of the device. Attackers could alter router configurations, intercept or redirect network traffic, deploy malware, or use the device as a foothold for further attacks within an organization's network. The integrity of network communications is at high risk, while confidentiality and availability are also affected but to a lesser extent. Organizations relying on this router model for home or small office networks may face significant security risks, including data breaches, unauthorized access, and network disruptions. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's nature and ease of exploitation (low complexity, no user interaction) make it a critical concern once exploit code becomes available.
Mitigation Recommendations
Organizations should immediately identify any Tenda AC18 routers running firmware version V15.03.3.10_EN and restrict access to the router's management interface, ideally limiting it to trusted internal networks. Network segmentation can reduce exposure. Monitoring network traffic for unusual requests to the ip/goform/fast_setting_wifi_set endpoint may help detect exploitation attempts. Since no official patches are currently available, contacting Tenda support for firmware updates or advisories is recommended. As a temporary measure, disabling remote management or changing default credentials can reduce risk. Additionally, deploying network intrusion detection systems (NIDS) with custom signatures targeting malformed ssid parameter requests can provide early warning. Organizations should plan to update firmware promptly once a patch is released and consider replacing vulnerable devices if timely updates are not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cbdb7ef31ef0b56895e
Added to database: 2/25/2026, 9:42:21 PM
Last enriched: 2/28/2026, 5:50:36 AM
Last updated: 4/11/2026, 5:56:36 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.