CVE-2024-57703
Published: 16 January 2025
Summary
CVE-2024-57703 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ac8 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the stack buffer overflow flaw in the setSchedWifi function through firmware updates for Tenda AC8v4 V16.03.34.06.
Mandates validation of the schedEndTime argument to block malformed or oversized inputs that trigger the stack-based buffer overflow.
Implements memory protections like stack canaries and non-executable stacks to mitigate exploitation of the buffer overflow vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The stack-based buffer overflow in the web interface function /goform/openSchedWifi of the Tenda AC8v4 router is exploitable remotely via a crafted schedEndTime parameter, enabling exploitation of a public-facing application.
NVD Description
Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow.
Deeper analysisAI
CVE-2024-57703 is a stack-based buffer overflow vulnerability in Tenda AC8v4 firmware version V16.03.34.06. The issue affects the setSchedWifi function within the /goform/openSchedWifi endpoint, where manipulation of the schedEndTime argument triggers the overflow. This flaw is classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), earning a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.
An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected web interface over the network. Successful exploitation leads to a stack-based buffer overflow, potentially allowing arbitrary code execution, denial of service, or unauthorized access with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).
Mitigation details and proof-of-concept information are available in the referenced advisory at https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md. Security practitioners should check for firmware updates from Tenda and apply network segmentation or exposure controls to vulnerable devices until patched.
Details
- CWE(s)