Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46652: n/a

0
Critical
VulnerabilityCVE-2024-46652cvecve-2024-46652
Published: Fri Sep 20 2024 (09/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability in the fromAdvSetMacMtuWan function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:30:06 UTC

Technical Analysis

CVE-2024-46652 identifies a stack-based buffer overflow vulnerability in the Tenda AC8v4 router firmware version V16.03.34.06, specifically within the fromAdvSetMacMtuWan function. This function likely handles advanced settings related to MAC address and MTU configuration on the WAN interface. The stack overflow occurs when input data exceeds the buffer capacity, allowing an attacker to overwrite the stack memory. Given the vulnerability's CVSS 3.1 score of 9.8, it is remotely exploitable over the network without requiring authentication or user interaction, indicating that an attacker can send specially crafted packets to the router to trigger the overflow. Successful exploitation can lead to arbitrary code execution, full system compromise, and denial of service, impacting confidentiality, integrity, and availability of the device and connected networks. The vulnerability is categorized under CWE-120, a common weakness enumeration for classic buffer overflows, which are often exploited for remote code execution. No patches or public exploits are currently available, but the critical severity demands immediate attention from users and administrators of affected devices. The lack of authentication and user interaction requirements significantly increases the attack surface, making this a high-risk vulnerability for exposed devices.

Potential Impact

The impact of CVE-2024-46652 is severe for organizations and individuals using the Tenda AC8v4 router with the specified firmware. Exploitation can lead to complete device takeover, allowing attackers to intercept, modify, or disrupt network traffic, steal sensitive information, or use the compromised device as a foothold for further attacks within the network. This can result in data breaches, network downtime, and loss of trust. Because the vulnerability is remotely exploitable without authentication, attackers can target exposed routers over the internet or local networks, increasing the risk of widespread exploitation. Enterprises relying on these routers for critical connectivity or IoT device management face heightened risks of operational disruption and data compromise. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the critical nature of the flaw means that once exploits emerge, rapid exploitation could occur. The vulnerability also threatens home users who may not regularly update firmware or monitor network security, potentially turning their devices into botnet nodes or attack vectors.

Mitigation Recommendations

1. Immediately restrict external access to the Tenda AC8v4 router management interfaces by disabling remote WAN management and restricting access to trusted IP addresses only. 2. Monitor network traffic for unusual or malformed packets targeting the WAN interface, especially those attempting to invoke advanced MAC or MTU settings. 3. Segment networks to isolate vulnerable routers from critical infrastructure and sensitive data environments to limit lateral movement if compromised. 4. Regularly check for firmware updates from Tenda and apply patches as soon as they become available to remediate the vulnerability. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying exploitation attempts targeting buffer overflow patterns. 6. Educate network administrators and users about the risks of outdated firmware and the importance of timely updates. 7. Consider temporary replacement or additional protective measures such as firewall rules to block suspicious traffic until a patch is released. 8. Conduct vulnerability scans and penetration tests focused on network devices to identify and address similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d04b7ef31ef0b56d3f0

Added to database: 2/25/2026, 9:43:32 PM

Last enriched: 2/28/2026, 7:30:06 AM

Last updated: 4/12/2026, 3:35:18 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses