ID

VAR-202306-0114


CVE

CVE-2023-33670


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-007625

DESCRIPTION

Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the time parameter in the sub_4a79ec function. Shenzhen Tenda Technology Co.,Ltd. of AC8 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC8 is a dual-band gigabit wireless router designed for homes with fiber optic connections up to 1000 Mbps. It supports dual-band concurrent transmission rates of up to 1167 Mbps and is equipped with full gigabit ports (one WAN port and three LAN ports), meeting broadband access needs between 100 and 1000 Mbps. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.25

sources: NVD: CVE-2023-33670 // JVNDB: JVNDB-2023-007625 // CNVD: CNVD-2025-20718 // VULMON: CVE-2023-33670

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-20718

AFFECTED PRODUCTS

vendor:tendamodel:ac8scope:eqversion:16.03.34.06

Trust: 1.0

vendor:tendamodel:ac8scope:eqversion:ac8 firmware 16.03.34.06

Trust: 0.8

vendor:tendamodel:ac8scope: - version: -

Trust: 0.8

vendor:tendamodel:ac8scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac8v4scope:eqversion:16.03.34.06

Trust: 0.6

sources: CNVD: CNVD-2025-20718 // JVNDB: JVNDB-2023-007625 // NVD: CVE-2023-33670

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-33670
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-33670
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-33670
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-20718
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202306-141
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2025-20718
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-33670
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-33670
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-20718 // CNNVD: CNNVD-202306-141 // JVNDB: JVNDB-2023-007625 // NVD: CVE-2023-33670 // NVD: CVE-2023-33670

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-007625 // NVD: CVE-2023-33670

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-141

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202306-141

EXTERNAL IDS

db:NVDid:CVE-2023-33670

Trust: 3.9

db:JVNDBid:JVNDB-2023-007625

Trust: 0.8

db:CNVDid:CNVD-2025-20718

Trust: 0.6

db:CNNVDid:CNNVD-202306-141

Trust: 0.6

db:VULMONid:CVE-2023-33670

Trust: 0.1

sources: CNVD: CNVD-2025-20718 // VULMON: CVE-2023-33670 // CNNVD: CNNVD-202306-141 // JVNDB: JVNDB-2023-007625 // NVD: CVE-2023-33670

REFERENCES

url:https://github.com/ddizzzy79/tenda-cve/blob/main/ac8v4.0/n3/readme.md

Trust: 3.1

url:https://github.com/ddizzzy79/tenda-cve/tree/main/ac8v4.0/n3

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-33670

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-33670/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-20718 // VULMON: CVE-2023-33670 // CNNVD: CNNVD-202306-141 // JVNDB: JVNDB-2023-007625 // NVD: CVE-2023-33670

SOURCES

db:CNVDid:CNVD-2025-20718
db:VULMONid:CVE-2023-33670
db:CNNVDid:CNNVD-202306-141
db:JVNDBid:JVNDB-2023-007625
db:NVDid:CVE-2023-33670

LAST UPDATE DATE

2025-09-08T23:15:58.567000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-20718date:2025-09-05T00:00:00
db:VULMONid:CVE-2023-33670date:2023-06-02T00:00:00
db:CNNVDid:CNNVD-202306-141date:2023-06-13T00:00:00
db:JVNDBid:JVNDB-2023-007625date:2023-11-24T08:09:00
db:NVDid:CVE-2023-33670date:2025-01-08T21:15:09.780

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-20718date:2025-09-05T00:00:00
db:VULMONid:CVE-2023-33670date:2023-06-02T00:00:00
db:CNNVDid:CNNVD-202306-141date:2023-06-02T00:00:00
db:JVNDBid:JVNDB-2023-007625date:2023-11-24T00:00:00
db:NVDid:CVE-2023-33670date:2023-06-02T20:15:09.563