CVE-2024-44549: n/a
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv.
AI Analysis
Technical Summary
CVE-2024-44549 is a stack overflow vulnerability identified in the Tenda AX1806 router firmware version 1.0.0.1. The vulnerability resides in the function formGetIptv, specifically through improper handling of the iptv.stb.port parameter. When this parameter is manipulated, it can cause a stack-based buffer overflow (CWE-121), which may allow an attacker to overwrite the stack memory. This can lead to arbitrary code execution or denial of service conditions on the affected device. The vulnerability requires the attacker to have local network access and low privileges (PR:L), with no user interaction needed (UI:N). The attack vector is local (AV:L), meaning remote exploitation over the internet is unlikely without prior network access. The CVSS v3.1 base score is 6.6, reflecting medium severity due to the potential impact on integrity (high) and availability (low), with limited confidentiality impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected product, Tenda AX1806, is a consumer-grade Wi-Fi 6 router commonly used in residential and small office environments. The vulnerability could be exploited by malicious insiders or attackers who gain access to the local network, potentially compromising network security and device stability.
Potential Impact
The primary impact of CVE-2024-44549 is the potential for an attacker with local network access to execute arbitrary code or cause a denial of service on Tenda AX1806 routers. This could lead to compromised network infrastructure, allowing attackers to intercept, modify, or disrupt network traffic. For organizations, this may result in degraded network performance, loss of availability, and potential lateral movement within the network if exploited. The integrity of the router’s firmware and configuration could be compromised, enabling persistent backdoors or further exploitation. Although the attack requires local access and low privileges, environments with weak network segmentation or guest network controls are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. The vulnerability could affect home users, small businesses, and any organization relying on Tenda AX1806 devices, potentially impacting confidentiality, integrity, and availability of network communications.
Mitigation Recommendations
1. Restrict local network access to the router’s management interfaces by implementing strong network segmentation and access controls. 2. Disable IPTV features or services on the Tenda AX1806 router if they are not required, reducing the attack surface related to the iptv.stb.port parameter. 3. Monitor network traffic for unusual activity that may indicate exploitation attempts targeting the IPTV functionality. 4. Apply firmware updates or patches from Tenda as soon as they become available to address this vulnerability. 5. Employ network intrusion detection systems (NIDS) to detect anomalous packets or malformed requests targeting the IPTV service. 6. Educate users and administrators about the risks of local network threats and enforce strong authentication mechanisms for device management. 7. Consider replacing affected devices with models from vendors with a stronger security track record if timely patches are not provided. 8. Regularly audit and review router configurations to ensure no unnecessary services are enabled and that security best practices are followed.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, Thailand, Malaysia, Ukraine, Poland
CVE-2024-44549: n/a
Description
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44549 is a stack overflow vulnerability identified in the Tenda AX1806 router firmware version 1.0.0.1. The vulnerability resides in the function formGetIptv, specifically through improper handling of the iptv.stb.port parameter. When this parameter is manipulated, it can cause a stack-based buffer overflow (CWE-121), which may allow an attacker to overwrite the stack memory. This can lead to arbitrary code execution or denial of service conditions on the affected device. The vulnerability requires the attacker to have local network access and low privileges (PR:L), with no user interaction needed (UI:N). The attack vector is local (AV:L), meaning remote exploitation over the internet is unlikely without prior network access. The CVSS v3.1 base score is 6.6, reflecting medium severity due to the potential impact on integrity (high) and availability (low), with limited confidentiality impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected product, Tenda AX1806, is a consumer-grade Wi-Fi 6 router commonly used in residential and small office environments. The vulnerability could be exploited by malicious insiders or attackers who gain access to the local network, potentially compromising network security and device stability.
Potential Impact
The primary impact of CVE-2024-44549 is the potential for an attacker with local network access to execute arbitrary code or cause a denial of service on Tenda AX1806 routers. This could lead to compromised network infrastructure, allowing attackers to intercept, modify, or disrupt network traffic. For organizations, this may result in degraded network performance, loss of availability, and potential lateral movement within the network if exploited. The integrity of the router’s firmware and configuration could be compromised, enabling persistent backdoors or further exploitation. Although the attack requires local access and low privileges, environments with weak network segmentation or guest network controls are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. The vulnerability could affect home users, small businesses, and any organization relying on Tenda AX1806 devices, potentially impacting confidentiality, integrity, and availability of network communications.
Mitigation Recommendations
1. Restrict local network access to the router’s management interfaces by implementing strong network segmentation and access controls. 2. Disable IPTV features or services on the Tenda AX1806 router if they are not required, reducing the attack surface related to the iptv.stb.port parameter. 3. Monitor network traffic for unusual activity that may indicate exploitation attempts targeting the IPTV functionality. 4. Apply firmware updates or patches from Tenda as soon as they become available to address this vulnerability. 5. Employ network intrusion detection systems (NIDS) to detect anomalous packets or malformed requests targeting the IPTV service. 6. Educate users and administrators about the risks of local network threats and enforce strong authentication mechanisms for device management. 7. Consider replacing affected devices with models from vendors with a stronger security track record if timely patches are not provided. 8. Regularly audit and review router configurations to ensure no unnecessary services are enabled and that security best practices are followed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cdeb7ef31ef0b569b38
Added to database: 2/25/2026, 9:42:54 PM
Last enriched: 2/28/2026, 6:39:17 AM
Last updated: 4/12/2026, 6:12:27 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.