Sploit.io - Search

Product: O5, version: 1.0.0.8(5017)

CVE-2024-8228

Severity: Unknown

Description: A vulnerability was found in Tenda O5 1.0.0.8(5017). It has been classified as critical. This affects the function fromSafeSetMacFilter of the file /goform/setMacFilterList. The manipulation of the argument remark/type/time leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Score: N/A

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.003530000
  • Percentile: 0.718620000
  • Date: 2025-01-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 7457
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Tenda O5 - Versions: 1.0.0.8(5017)

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-8228 is a critical stack-based buffer overflow in the Tenda O5 router firmware version 1.0.0.8(5017). This flaw resides in the `fromSafeSetMacFilter` function within the `/goform/setMacFilterList` file, where improper handling of the `remark/type/time` arguments allows attackers to overwrite memory on the stack. The vulnerability is remotely exploitable, requiring only low-privileged access (PR:L) and no user interaction (UI:N). With a CVSS v3.1 base score of 8.8 (HIGH), the risk is significant.

    The likelihood of exploitation is high due to the public disclosure of the exploit and the lack of vendor response to the vulnerability disclosure. Attackers can leverage this flaw to execute arbitrary code, potentially gaining full control over the affected device. The impact on confidentiality, integrity, and availability is severe, as attackers could exfiltrate sensitive data, manipulate device configurations, or render the device inoperable. Organizations using the affected Tenda O5 routers face substantial risks, including data breaches, service disruptions, and reputational damage.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by crafting a malicious HTTP request targeting the `/goform/setMacFilterList` endpoint on the Tenda O5 router. By manipulating the `remark/type/time` parameters, the attacker triggers a stack-based buffer overflow, overwriting critical memory regions. This could allow the attacker to execute arbitrary code with the privileges of the affected service, potentially gaining root access to the device.

    Once the attacker gains control, they could pivot to other devices on the network, exfiltrate sensitive data, or deploy malware. For example, the attacker could install a persistent backdoor, enabling long-term access to the network. Alternatively, they could disrupt network operations by modifying router configurations or rendering the device unusable. In a worst-case scenario, this could lead to a complete network outage, impacting business operations and causing financial losses.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using Tenda O5 routers should:
    - Discontinue use of the affected firmware version 1.0.0.8(5017) and upgrade to a patched version if available. Monitor the vendor's website (https://www.tenda.com.cn/) for updates.
    - If no patch is available, consider replacing the affected devices with routers from a vendor that provides timely security updates.
    - Implement network segmentation to isolate the affected routers and limit the potential impact of an exploit.
    - Monitor network traffic for unusual activity, particularly HTTP requests targeting the `/goform/setMacFilterList` endpoint.
    - Apply strict access controls to the router's administrative interface, ensuring only authorized users can access it.
    - Regularly review and update incident response plans to address potential exploits of this vulnerability.

    4. Executive Summary
    CVE-2024-8228 is a critical vulnerability in Tenda O5 routers that allows remote attackers to execute arbitrary code and potentially take full control of the device. The vulnerability is easy to exploit, and the public availability of the exploit increases the risk of widespread attacks. The potential impacts include data breaches, network disruptions, and reputational damage.

    Organizations using the affected routers must take immediate action to mitigate this risk. This includes upgrading to a patched firmware version, isolating affected devices, and monitoring for signs of exploitation. Failure to address this vulnerability could result in significant financial and operational consequences. The urgency of this issue cannot be overstated, and proactive measures are essential to protect business operations and sensitive data.