CVE-2024-44558: n/a
Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.
AI Analysis
Technical Summary
CVE-2024-44558 is a stack overflow vulnerability identified in the Tenda AX1806 router firmware version 1.0.0.1. The vulnerability resides in the setIptvInfo function, which processes the adv.iptv.stbpvid parameter. A stack overflow occurs when this parameter is manipulated with crafted input, leading to memory corruption. This type of vulnerability (CWE-121) can allow attackers to overwrite the call stack, potentially enabling arbitrary code execution or causing a denial of service by crashing the device. The vulnerability is remotely exploitable without authentication (AV:A, PR:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can fully compromise the device remotely. The Tenda AX1806 is a consumer-grade Wi-Fi 6 router commonly used in residential and small office environments. No official patches or firmware updates have been released at the time of publication, and no exploits have been publicly reported. The vulnerability's presence in a widely deployed router model raises concerns about potential widespread exploitation once exploit code becomes available.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected Tenda AX1806 routers without authentication or user interaction. This can lead to complete compromise of the device, enabling attackers to intercept, modify, or disrupt network traffic, potentially pivoting to internal networks. Confidentiality of data passing through the router can be breached, integrity of network communications compromised, and availability of network services disrupted. Organizations relying on these routers for critical connectivity or IPTV services face risks of operational downtime, data breaches, and unauthorized network access. The lack of patches increases the window of exposure, and automated exploitation could lead to large-scale attacks targeting vulnerable devices globally.
Mitigation Recommendations
1. Immediately isolate Tenda AX1806 routers from untrusted networks, especially the internet, to reduce exposure. 2. Disable IPTV features or the adv.iptv.stbpvid parameter functionality if not required, to eliminate the attack vector. 3. Implement network segmentation to limit access to router management interfaces and IPTV services. 4. Monitor network traffic for anomalous packets targeting IPTV parameters or unusual requests to the router's management endpoints. 5. Contact Tenda support for firmware updates or advisories and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with active security support if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for stack overflow attempts targeting Tenda routers. 8. Educate network administrators about this vulnerability and enforce strict access controls on router configuration interfaces.
Affected Countries
China, India, Indonesia, Vietnam, Russia, Brazil, United States, Germany, United Kingdom, France, Italy, Spain
CVE-2024-44558: n/a
Description
Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44558 is a stack overflow vulnerability identified in the Tenda AX1806 router firmware version 1.0.0.1. The vulnerability resides in the setIptvInfo function, which processes the adv.iptv.stbpvid parameter. A stack overflow occurs when this parameter is manipulated with crafted input, leading to memory corruption. This type of vulnerability (CWE-121) can allow attackers to overwrite the call stack, potentially enabling arbitrary code execution or causing a denial of service by crashing the device. The vulnerability is remotely exploitable without authentication (AV:A, PR:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can fully compromise the device remotely. The Tenda AX1806 is a consumer-grade Wi-Fi 6 router commonly used in residential and small office environments. No official patches or firmware updates have been released at the time of publication, and no exploits have been publicly reported. The vulnerability's presence in a widely deployed router model raises concerns about potential widespread exploitation once exploit code becomes available.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected Tenda AX1806 routers without authentication or user interaction. This can lead to complete compromise of the device, enabling attackers to intercept, modify, or disrupt network traffic, potentially pivoting to internal networks. Confidentiality of data passing through the router can be breached, integrity of network communications compromised, and availability of network services disrupted. Organizations relying on these routers for critical connectivity or IPTV services face risks of operational downtime, data breaches, and unauthorized network access. The lack of patches increases the window of exposure, and automated exploitation could lead to large-scale attacks targeting vulnerable devices globally.
Mitigation Recommendations
1. Immediately isolate Tenda AX1806 routers from untrusted networks, especially the internet, to reduce exposure. 2. Disable IPTV features or the adv.iptv.stbpvid parameter functionality if not required, to eliminate the attack vector. 3. Implement network segmentation to limit access to router management interfaces and IPTV services. 4. Monitor network traffic for anomalous packets targeting IPTV parameters or unusual requests to the router's management endpoints. 5. Contact Tenda support for firmware updates or advisories and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with active security support if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for stack overflow attempts targeting Tenda routers. 8. Educate network administrators about this vulnerability and enforce strict access controls on router configuration interfaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cdeb7ef31ef0b569b4a
Added to database: 2/25/2026, 9:42:54 PM
Last enriched: 2/28/2026, 6:40:48 AM
Last updated: 4/12/2026, 10:31:57 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.