Cyber Posture

CVE-2024-57704

HighPublic PoC

Published: 16 January 2025

Published
16 January 2025
Modified
17 March 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0031 54.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57704 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ac8 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires input validation at entry points like the schedStartTime argument in /goform/openSchedWifi, directly preventing stack-based buffer overflows from malformed inputs.

prevent

SI-16 enforces memory protections such as stack canaries, ASLR, and DEP that mitigate exploitation of stack buffer overflows even if invalid input reaches the function.

prevent

SI-2 mandates timely identification and remediation of flaws like CVE-2024-57704, preventing exploitation through firmware patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack overflow in public-facing web interface (/goform/openSchedWifi) enables remote code execution via exploitation of the vulnerable router application.

NVD Description

Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime leads to stack-based buffer overflow.

Deeper analysisAI

CVE-2024-57704 is a stack-based buffer overflow vulnerability (CWE-787) affecting Tenda AC8v4 router firmware version V16.03.34.06. The flaw resides in the setSchedWifi function within the /goform/openSchedWifi file, where manipulation of the schedStartTime argument triggers the overflow.

The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating network accessibility with low attack complexity. Exploitation requires low privileges, such as those of an authenticated user, and no user interaction. Successful exploitation can compromise confidentiality, integrity, and availability to a high degree.

Advisories and mitigation details are available in the referenced GitHub repository at https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md. No specific patch information is detailed in the provided CVE data.

Details

CWE(s)

Affected Products

tenda
ac8 firmware
16.03.34.06

CVEs Like This One

CVE-2024-57703Same product: Tenda Ac8
CVE-2025-25664Same product: Tenda Ac8
CVE-2025-25663Same product: Tenda Ac8
CVE-2025-1853Same product: Tenda Ac8
CVE-2026-4254Same product: Tenda Ac8
CVE-2025-29100Same product: Tenda Ac8
CVE-2026-2202Same product: Tenda Ac8
CVE-2025-25668Same product: Tenda Ac8
CVE-2025-51087Same product: Tenda Ac8
CVE-2026-4252Same product: Tenda Ac8

References