CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-0927: Tenda AC10U fromAddressNat stack-based overflow

4.7 CVSS

Description

A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine kritische Schwachstelle in Tenda AC10U 15.03.06.49_multi_TDE01 ausgemacht. Es geht dabei um die Funktion fromAddressNat. Dank Manipulation des Arguments entrys/mitInterface/page mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2024-0927

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.7

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Problem Types

CWE-121 Stack-based Buffer Overflow

Affected Products

Vendor: Tenda

Product: AC10U

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.17% (probability of being exploited)

EPSS Percentile: 39.34% (scored less or equal to compared to others)

EPSS Date: 2025-06-17 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-0927
https://vuldb.com/?id.252132
https://vuldb.com/?ctiid.252132
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md

Timeline