Sploit.io - Search

Product: o3v2_firmware, version: 1.0.0.10

CVE-2024-6963

Severity: Unknown

Description: A vulnerability, which was classified as critical, has been found in Tenda O3 1.0.0.10. This issue affects the function formexeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272117 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Score: N/A

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.002210000
  • Percentile: 0.601300000
  • Date: 2025-01-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 7457
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Tenda O3 - Versions: 1.0.0.10

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-6963 is a critical stack-based buffer overflow in the Tenda O3 firmware version 1.0.0.10, specifically within the formexeCommand function. This flaw allows remote attackers to manipulate the cmdinput argument, leading to potential exploitation. The CVSS v3.1 base score of 8.8 (HIGH) underscores the severity of this issue, with impacts on confidentiality, integrity, and availability rated as high. The attack vector is network-based, requiring low attack complexity and low privileges, making it relatively easy to exploit.

    The business impact of this vulnerability is significant. If exploited, attackers could gain unauthorized access to the device, execute arbitrary code, and potentially compromise the entire network to which the device is connected. This could lead to data breaches, service disruptions, and reputational damage. The likelihood of exploitation is heightened by the public disclosure of the exploit and the vendor's lack of response to the vulnerability disclosure.

    2. Potential Attack Scenarios
    One potential attack scenario involves an attacker targeting a Tenda O3 device exposed to the internet. The attacker crafts a malicious payload designed to exploit the stack-based buffer overflow in the formexeCommand function. By sending this payload to the device, the attacker overflows the buffer, overwriting critical memory structures and gaining control over the device's execution flow.

    The attack process begins with the attacker scanning for vulnerable Tenda O3 devices using publicly available tools. Once a target is identified, the attacker sends the malicious payload to the device's vulnerable function. Successful exploitation allows the attacker to execute arbitrary code with the privileges of the affected service, potentially leading to a full device compromise. The attacker could then pivot to other devices on the network, exfiltrate sensitive data, or deploy ransomware.

    The potential outcomes of this attack include complete device compromise, unauthorized access to sensitive information, disruption of network services, and lateral movement within the network to target additional systems.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using Tenda O3 devices should:
    - Disconnect affected devices from the internet or restrict access to trusted networks only.
    - Monitor for firmware updates from Tenda and apply patches as soon as they become available.
    - Implement network segmentation to limit the potential impact of a compromised device.
    - Deploy intrusion detection systems (IDS) or intrusion prevention systems (IPS) to detect and block exploitation attempts.
    - Regularly review and update security configurations to minimize attack surfaces.

    For further technical details and exploit information, refer to the following resources:
    - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-6963
    - VulDB Entry: https://vuldb.com/?id.272117
    - GitHub Exploit Details: https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/formexeCommand.md

    4. Executive Summary
    CVE-2024-6963 is a critical vulnerability affecting Tenda O3 devices, allowing remote attackers to execute arbitrary code through a stack-based buffer overflow. This flaw poses a high risk to organizations using these devices, with potential impacts including data breaches, service disruptions, and network compromise. The vulnerability is easily exploitable, and public disclosure of the exploit increases the likelihood of attacks.

    To protect against this threat, immediate action is required. Organizations should isolate affected devices, monitor for firmware updates, and implement network security measures to mitigate risks. Addressing this vulnerability is critical to safeguarding sensitive data, maintaining operational continuity, and protecting organizational reputation. The urgency of this issue cannot be overstated, and proactive measures are essential to prevent exploitation.

    CVE-2024-6965

    Severity: Unknown

    Description: A vulnerability has been found in Tenda O3 1.0.0.10 and classified as critical. Affected by this vulnerability is the function fromVirtualSet. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272119. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

    CVSS Score: N/A

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.002210000
    • Percentile: 0.601300000
    • Date: 2025-01-19

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7457
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Tenda O3 - Versions: 1.0.0.10

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-6965 is a critical stack-based buffer overflow in the Tenda O3 firmware version 1.0.0.10, specifically within the fromVirtualSet function. This flaw allows remote attackers to manipulate the arguments ip, localPort, publicPort, and app, leading to potential exploitation. The CVSS v3.1 base score of 8.8 (HIGH) underscores the severity, with impacts on confidentiality, integrity, and availability rated as high. The attack vector is network-based, requiring low attack complexity and low privileges, making it relatively easy to exploit.

      The likelihood of exploitation is significant, as the exploit has been publicly disclosed and may already be in use. The lack of response from the vendor further exacerbates the risk, as no patches or mitigations have been provided. The business impact of this vulnerability is severe, as successful exploitation could lead to complete system compromise, unauthorized access to sensitive data, disruption of services, and potential lateral movement within the network. Organizations using the affected Tenda O3 devices are at high risk of operational disruption and data breaches.

      2. Potential Attack Scenarios
      An attacker could exploit this vulnerability by crafting a malicious payload targeting the fromVirtualSet function. The attack vector would involve sending specially crafted network packets to the vulnerable device, manipulating the ip, localPort, publicPort, and app arguments to trigger the buffer overflow. This could allow the attacker to execute arbitrary code on the device with the privileges of the affected service.

      The attack process would begin with reconnaissance to identify vulnerable Tenda O3 devices exposed to the internet or within the target network. The attacker would then use publicly available exploit code or develop a custom exploit to send the malicious payload. Upon successful exploitation, the attacker could gain full control of the device, exfiltrate sensitive data, or use the compromised device as a pivot point for further attacks within the network. The potential outcomes include data theft, service disruption, and complete system compromise, leading to significant operational and reputational damage.

      3. Mitigation Recommendations
      Immediate action is required to mitigate this vulnerability. Organizations using Tenda O3 devices should:
      - Disconnect affected devices from the network until a patch or mitigation is available.
      - Monitor network traffic for unusual activity or attempts to exploit the vulnerability.
      - Apply network segmentation to limit the exposure of vulnerable devices.
      - Contact the vendor, Tenda, for updates or patches, though no response has been received to date.
      - Consider replacing affected devices with those from vendors that provide timely security updates.

      For additional guidance, refer to the following resources:
      - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-6965
      - VulDB Entry: https://vuldb.com/?id.272119
      - Exploit Details: https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/fromVirtualSet.md

      4. Executive Summary
      CVE-2024-6965 is a critical vulnerability in Tenda O3 devices, allowing remote attackers to execute arbitrary code and potentially take full control of affected systems. The vulnerability is easy to exploit, and the exploit has been publicly disclosed, increasing the risk of widespread attacks. The lack of vendor response further complicates the situation, leaving organizations with limited mitigation options.

      The potential impacts include data breaches, service disruptions, and complete system compromise, posing significant risks to business operations and reputation. Immediate action is required to mitigate this vulnerability, including disconnecting affected devices, monitoring for exploitation attempts, and considering device replacement. This issue highlights the importance of proactive vulnerability management and the need for vendors to provide timely security updates to protect their customers.

      CVE-2024-7151

      Severity: Unknown

      Description: A vulnerability was found in Tenda O3 1.0.0.10(2478). It has been declared as critical. This vulnerability affects the function fromMacFilterSet of the file /goform/setMacFilter. The manipulation of the argument remark leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-272554 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

      CVSS Score: N/A

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.000990000
      • Percentile: 0.423420000
      • Date: 2025-01-19

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 7457
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Tenda O3 - Versions: 1.0.0.10(2478)

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability identified as CVE-2024-7151 is a critical stack-based buffer overflow in the Tenda O3 router firmware version 1.0.0.10(2478). This flaw resides in the `fromMacFilterSet` function within the `/goform/setMacFilter` file, specifically affecting the `remark` argument. The vulnerability can be exploited remotely, requiring low attack complexity and only low privileges, making it highly accessible to attackers. The CVSS v3.1 base score of 8.8 (HIGH) underscores its severity, with impacts on confidentiality, integrity, and availability rated as high.

        The likelihood of exploitation is significant, as the exploit has been publicly disclosed and is available for use. Attackers can leverage this vulnerability to execute arbitrary code, potentially gaining full control over the affected device. This could lead to unauthorized access to sensitive data, disruption of network services, or even the deployment of malware. The business impact is substantial, particularly for organizations relying on Tenda O3 routers for network infrastructure, as it could result in data breaches, operational downtime, and reputational damage.

        2. Potential Attack Scenarios
        One potential attack scenario involves an attacker targeting a vulnerable Tenda O3 router within an organization's network. The attacker begins by scanning the network for devices running the affected firmware version. Once identified, the attacker sends a specially crafted request to the `/goform/setMacFilter` endpoint, manipulating the `remark` argument to trigger the stack-based buffer overflow.

        The overflow allows the attacker to overwrite critical memory regions, enabling the execution of arbitrary code with the privileges of the affected service. With this level of access, the attacker can install malware, exfiltrate sensitive data, or pivot to other devices within the network. The potential outcomes include complete compromise of the router, unauthorized access to internal systems, and disruption of network operations, leading to significant financial and operational consequences for the organization.

        3. Mitigation Recommendations
        Immediate action is required to mitigate this vulnerability. Organizations using Tenda O3 routers should first check the firmware version and confirm if it is affected. If the device is running version 1.0.0.10(2478), the following steps are recommended:

        - Apply any available firmware updates or patches from the vendor. As of the disclosure date, the vendor has not responded, so organizations should monitor official channels for updates.
        - If no patch is available, consider disabling the affected functionality or restricting access to the vulnerable endpoint through network segmentation or firewall rules.
        - Implement intrusion detection and prevention systems (IDPS) to monitor for suspicious activity targeting the `/goform/setMacFilter` endpoint.
        - Regularly review and update network security policies to ensure devices are not exposed to unnecessary risks.

        For additional technical details and exploit information, refer to the following resources:
        - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-7151
        - VulDB Entry: https://vuldb.com/?id.272554
        - GitHub Exploit Details: https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/O3v2.0/fromMacFilterSet.md

        4. Executive Summary
        CVE-2024-7151 is a critical vulnerability affecting Tenda O3 routers, allowing remote attackers to execute arbitrary code through a stack-based buffer overflow. This flaw poses a high risk to organizations, with potential impacts including data breaches, network compromise, and operational disruption. The exploit is publicly available, increasing the likelihood of attacks.

        To safeguard against this threat, organizations must immediately verify if their devices are running the affected firmware and apply patches if available. If no patch is provided by the vendor, mitigating controls such as network segmentation and intrusion detection should be implemented. Addressing this vulnerability is urgent to protect sensitive data, maintain network integrity, and ensure business continuity. Failure to act could result in severe financial and reputational consequences.

        CVE-2024-7152

        Severity: Unknown

        Description: A vulnerability was found in Tenda O3 1.0.0.10(2478). It has been rated as critical. This issue affects the function fromSafeSetMacFilter of the file /goform/setMacFilterList. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272555. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

        CVSS Score: N/A

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.005560000
        • Percentile: 0.776390000
        • Date: 2025-01-19

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 7457
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • Tenda O3 - Versions: 1.0.0.10(2478)

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability identified as CVE-2024-7152 is a critical stack-based buffer overflow in the Tenda O3 router firmware version 1.0.0.10(2478). This flaw resides in the `fromSafeSetMacFilter` function within the `/goform/setMacFilterList` file, specifically involving the manipulation of the `time` argument. The vulnerability has a CVSS v3.1 base score of 8.8 (HIGH), indicating a severe risk.

          The nature of this vulnerability allows remote attackers to exploit it without requiring user interaction, provided they have low-privileged access to the system. The exploitation of this flaw can lead to arbitrary code execution, potentially compromising the confidentiality, integrity, and availability of the affected device. Given that the exploit has been publicly disclosed and may already be in use, the likelihood of exploitation is high.

          The business impact of this vulnerability is significant. If exploited, attackers could gain full control over the router, enabling them to intercept sensitive data, manipulate network traffic, or render the device inoperable. This could lead to operational disruptions, data breaches, and reputational damage for organizations relying on the affected devices.

          2. Potential Attack Scenarios
          One potential attack scenario involves an attacker leveraging the stack-based buffer overflow to execute arbitrary code on the Tenda O3 router. The attack vector begins with the attacker gaining low-privileged access to the router, either through compromised credentials or another vulnerability. Once access is obtained, the attacker sends a specially crafted request to the `/goform/setMacFilterList` endpoint, manipulating the `time` argument to trigger the buffer overflow.

          The attack process involves overwriting the stack memory, allowing the attacker to inject malicious code into the router's execution flow. This could result in the execution of arbitrary commands, enabling the attacker to install malware, exfiltrate sensitive data, or pivot to other devices on the network. The potential outcomes include complete compromise of the router, unauthorized access to connected devices, and disruption of network services.

          3. Mitigation Recommendations
          Immediate action is required to mitigate this vulnerability. The following steps are recommended:

          - Apply the latest firmware update from Tenda as soon as it becomes available. Monitor the vendor's website or contact their support team for updates.
          - If a patch is not immediately available, consider disabling the affected functionality or restricting access to the `/goform/setMacFilterList` endpoint.
          - Implement network segmentation to isolate the affected routers from critical systems, reducing the potential impact of an exploit.
          - Monitor network traffic for unusual activity, particularly requests targeting the vulnerable endpoint.
          - Review and update access controls to ensure that only authorized users have administrative access to the router.

          For additional guidance, refer to the following resources:
          - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-7152
          - VulDB Entry: https://vuldb.com/?id.272555
          - GitHub Exploit Details: https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/O3v2.0/fromSafeSetMacFilter.md

          4. Executive Summary
          CVE-2024-7152 is a critical vulnerability affecting the Tenda O3 router firmware, posing a high risk to organizations using this device. The flaw allows remote attackers to execute arbitrary code, potentially leading to data breaches, network disruptions, and unauthorized access to connected systems. The exploit has been publicly disclosed, increasing the likelihood of active exploitation.

          To address this vulnerability, immediate action is required. Organizations should apply firmware updates, restrict access to vulnerable endpoints, and monitor network traffic for signs of exploitation. Failure to mitigate this risk could result in significant operational and reputational damage. Prioritizing these actions is essential to safeguard network integrity and protect sensitive data.