CVSS 3.1 Score 9.8 of 10 (high)


Published Aug 7, 2023
Updated: Aug 9, 2023
CWE ID 787


CVE-2023-38930 is a critical vulnerability discovered in Tenda AC7 V1.0, V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0, V15.03.06.28, AC9 V3.0, V15.03.06.42_multi, and FH1205 V2.0.0.7(775) devices due to a stack overflow in the addWifiMacFilter function caused by the deviceId parameter. The vulnerability has a base severity score of 9.8 out of 10 and poses a high risk with potential impact on integrity and confidentiality of an organization's data as well as availability of the affected devices/services/systems within a network environment via network-based attack vectors with low complexity required for exploitation and no user interaction needed to exploit it further compromising an organization's security posture or infrastructure resilience against cyber threats or adversaries' activities exploiting this vulnerability for unauthorized access or disruption of services/operations through the execution of arbitrary code or unauthorized changes to system data structures or device behavior/control mechanisms without proper mitigation measures in place. To remediate this vulnerability, it is recommended to update the firmware of the affected Tenda devices to a version that includes a fix for this issue provided by the vendor as soon as possible to mitigate the risk associated with this vulnerability and enhance the security posture of the organization's network infrastructure. Note: The information provided in this summary is based on available metadata describing CVE-2023-38930 obtained from reliable sources such as [email protected] but does not include any additional analysis beyond what is explicitly stated in those sources. Sources: - National Vulnerability Database (NVD) at NIST:


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-38930 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options