Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50853: n/a

0
High
VulnerabilityCVE-2024-50853cvecve-2024-50853
Published: Wed Nov 13 2024 (11/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda G3 v3.0 v15.11.0.20 was discovered to contain a command injection vulnerability via the formSetDebugCfg function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:47:24 UTC

Technical Analysis

CVE-2024-50853 is a command injection vulnerability identified in the Tenda G3 router, specifically version 3.0 running firmware v15.11.0.20. The vulnerability resides in the formSetDebugCfg function, which improperly sanitizes input, allowing an attacker to inject and execute arbitrary system commands remotely. This type of vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS 3.1 vector (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack can be performed remotely over the network (Adjacent Network), requires no privileges or user interaction, and results in high impact on confidentiality, integrity, and availability. Successful exploitation could allow attackers to take full control of the device, manipulate network traffic, intercept or alter data, and disrupt network services. Although no public exploits or patches are currently available, the vulnerability's nature and scoring suggest it is critical for affected users to implement mitigations promptly. The lack of authentication requirement and ease of exploitation make this a significant threat to network security, especially in environments relying on this router for critical connectivity.

Potential Impact

The impact of CVE-2024-50853 is substantial for organizations using the affected Tenda G3 routers. An attacker exploiting this vulnerability can gain full control over the router, leading to complete compromise of network traffic passing through the device. This can result in interception of sensitive information, insertion of malicious payloads, or disruption of network availability. The integrity of data can be compromised by altering or injecting malicious commands, and confidentiality breaches may expose internal network details or user data. Availability impacts include potential denial of service by destabilizing or disabling the router. Given the router’s role as a network gateway, the vulnerability could serve as a pivot point for further attacks within an organization's internal network. The absence of required authentication and user interaction lowers the barrier for exploitation, increasing the risk of widespread attacks once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-50853, organizations should first verify if they are using the affected Tenda G3 router model with firmware v15.11.0.20. Immediate steps include isolating the device from untrusted networks, especially adjacent networks where exploitation is possible. Network segmentation should be enforced to limit access to the router’s management interfaces. Employ strict firewall rules to restrict access to the router’s configuration endpoints, particularly the formSetDebugCfg function if accessible via web or API interfaces. Monitor network traffic for unusual command execution patterns or unauthorized access attempts. Since no official patch is currently available, consider temporary mitigations such as disabling remote management features or debug configuration interfaces if possible. Engage with Tenda support channels for updates on patches or firmware upgrades addressing this vulnerability. Additionally, implement network intrusion detection systems (NIDS) to detect exploitation attempts and maintain robust incident response procedures to quickly isolate and remediate compromised devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba2b7ef31ef0b5575d9

Added to database: 2/25/2026, 9:37:38 PM

Last enriched: 2/27/2026, 10:47:24 PM

Last updated: 4/12/2026, 3:34:14 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses