Sploit.io - Search

Product: o3_firmware, version: 1.0.0.5

CVE-2024-51409

Severity: MEDIUM

Description: Buffer Overflow vulnerability in Tenda O3 v.1.0.0.5 allows a remote attacker to cause a denial of service via a network packet in a fixed format to a router running the corresponding version of the firmware.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.113600000
  • Date: 2025-01-17

ExploitDB

No data available.

HackerOne Data

  • Rank: 7457
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a n/a - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The CVE-2024-51409 vulnerability is a buffer overflow issue in the Tenda O3 router firmware version 1.0.0.5. This vulnerability allows a remote attacker to send a specially crafted network packet to the router, potentially causing a denial of service (DoS) by crashing the device or rendering it unresponsive. The CVSS v3.1 base score of 6.5 (Medium severity) indicates that the attack vector is adjacent network-based, requiring no user interaction or privileges, and has a high impact on availability.

    The likelihood of exploitation is moderate, as the vulnerability requires the attacker to be on the same network segment as the target device. However, the ease of exploitation is relatively high due to the low attack complexity and the availability of proof-of-concept (PoC) code. The primary impact is on availability, as the vulnerability can disrupt network services by crashing the router. There is no direct impact on confidentiality or integrity, as the vulnerability does not allow for data exfiltration or unauthorized modifications.

    Business impact could be significant, especially for organizations relying on the affected routers for critical network operations. A successful exploit could lead to downtime, loss of productivity, and potential reputational damage.

    2. Potential Attack Scenarios
    An attacker on the same local network as the Tenda O3 router could exploit this vulnerability by crafting a malicious network packet in a fixed format and sending it to the router. The packet would trigger the buffer overflow, causing the router's firmware to crash or become unresponsive. This would result in a denial of service, disrupting all network traffic passing through the router.

    For example, in a small office environment, an attacker could connect to the network, identify the router's IP address, and send the malicious packet using readily available tools or scripts. The router would then stop functioning, cutting off internet access for all connected devices. The attacker could repeat this process to maintain the disruption, causing prolonged downtime and operational challenges for the business.

    3. Mitigation Recommendations
    Immediate action should be taken to mitigate this vulnerability. The following steps are recommended:

    - Apply the latest firmware update from Tenda for the O3 router. If a patch is not yet available, monitor the vendor's website for updates and apply it as soon as it is released.
    - If patching is not immediately possible, consider isolating the router from untrusted networks or segments to reduce the attack surface.
    - Implement network segmentation to limit the exposure of critical devices to potential attackers.
    - Monitor network traffic for unusual patterns or attempts to send malformed packets to the router.
    - Refer to the following resources for additional guidance:
    - Tenda's official website for firmware updates: [Tenda Support](https://www.tenda.com)
    - Proof-of-concept details and technical analysis: [GitHub PoC](https://github.com/fireknight-hJ/Tenda-cve-pocs/blob/main/Tenda%20O3V1.0.0.5%284180%29/websReadEvent.md)

    4. Executive Summary
    CVE-2024-51409 is a buffer overflow vulnerability in the Tenda O3 router firmware version 1.0.0.5. It allows a remote attacker on the same network to crash the router, causing a denial of service. This could lead to significant downtime and operational disruption for businesses relying on the affected routers.

    The vulnerability is moderately easy to exploit, with a high impact on availability but no direct impact on data confidentiality or integrity. Immediate action is recommended, including applying firmware updates, isolating the router from untrusted networks, and monitoring for suspicious activity. Addressing this vulnerability is critical to maintaining network stability and ensuring uninterrupted business operations.