Cyber Posture

CVE-2024-57703

CriticalPublic PoC

Published: 16 January 2025

Published
16 January 2025
Modified
17 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 55.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57703 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ac8 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the stack buffer overflow flaw in the setSchedWifi function through firmware updates for Tenda AC8v4 V16.03.34.06.

prevent

Mandates validation of the schedEndTime argument to block malformed or oversized inputs that trigger the stack-based buffer overflow.

prevent

Implements memory protections like stack canaries and non-executable stacks to mitigate exploitation of the buffer overflow vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The stack-based buffer overflow in the web interface function /goform/openSchedWifi of the Tenda AC8v4 router is exploitable remotely via a crafted schedEndTime parameter, enabling exploitation of a public-facing application.

NVD Description

Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow.

Deeper analysisAI

CVE-2024-57703 is a stack-based buffer overflow vulnerability in Tenda AC8v4 firmware version V16.03.34.06. The issue affects the setSchedWifi function within the /goform/openSchedWifi endpoint, where manipulation of the schedEndTime argument triggers the overflow. This flaw is classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), earning a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.

An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected web interface over the network. Successful exploitation leads to a stack-based buffer overflow, potentially allowing arbitrary code execution, denial of service, or unauthorized access with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).

Mitigation details and proof-of-concept information are available in the referenced advisory at https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md. Security practitioners should check for firmware updates from Tenda and apply network segmentation or exposure controls to vulnerable devices until patched.

Details

CWE(s)

Affected Products

tenda
ac8 firmware
16.03.34.06

CVEs Like This One

CVE-2025-25664Same product: Tenda Ac8
CVE-2025-25663Same product: Tenda Ac8
CVE-2025-25668Same product: Tenda Ac8
CVE-2024-57704Same product: Tenda Ac8
CVE-2025-25667Same product: Tenda Ac8
CVE-2026-2202Same product: Tenda Ac8
CVE-2025-1853Same product: Tenda Ac8
CVE-2026-4254Same product: Tenda Ac8
CVE-2025-29100Same product: Tenda Ac8
CVE-2025-51087Same product: Tenda Ac8

References