Cyber Posture

CVE-2024-57581

CriticalPublic PoC

Published: 16 January 2025

Published
16 January 2025
Modified
18 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0047 64.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-57581 is a stack overflow vulnerability (CWE-787) in the Tenda AC18 router firmware version V15.03.05.19. The flaw occurs in the formSetFirewallCfg function when processing the firewallEn parameter, which can be manipulated to overflow the stack.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Exploitation could grant attackers high-impact control over confidentiality, integrity, and availability, likely enabling remote code execution on the affected device.

Advisories and further details, including potential proof-of-concept code, are available in the referenced GitHub repository at https://github.com/qijiale/Tenda/tree/main/8, published on 2025-01-16.

Details

CWE(s)
CWE-787

Affected Products

tenda
ac18 firmware
15.03.05.19

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The stack overflow vulnerability in the formSetFirewallCfg function via the firewallEn parameter in the Tenda AC18 router's web interface enables remote code execution on a public-facing application.

References