CVE-2021-47802

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to download router configuration files without authentication on Tenda D151 and D301 routers. Attackers can retrieve admin credentials and other sensitive data by sending a request to the /goform/getimage endpoint. Users of these specific router models are affected.

💻 Affected Systems

Products:
  • Tenda D151
  • Tenda D301
Versions: All versions prior to patched firmware (specific version unknown from provided data)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the default configuration of these routers, as the vulnerable endpoint is accessible without authentication by design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to the router, enabling them to reconfigure settings, intercept network traffic, or launch further attacks on connected devices.

🟠

Likely Case

Attackers steal admin credentials and compromise the router's security, potentially leading to unauthorized network access or data theft.

🟢

If Mitigated

If routers are not internet-facing and have strong network segmentation, impact is limited to internal attackers, reducing overall risk.

🌐 Internet-Facing: HIGH, as the exploit is unauthenticated and can be performed remotely over the internet, exposing routers directly accessible from the web.
🏢 Internal Only: MEDIUM, as internal attackers could still exploit this if they have network access, but it requires being on the same local network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB, making it easy for attackers to use with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version; check Tenda vendor updates

Vendor Advisory: https://www.tendacn.com/us/

Restart Required: Yes

Instructions:

1. Visit the Tenda support website. 2. Download the latest firmware for your router model. 3. Log into the router admin panel. 4. Navigate to firmware upgrade section. 5. Upload and apply the new firmware. 6. Reboot the router after update.

🔧 Temporary Workarounds

Block External Access

linux

Prevent internet access to the router's admin interface by disabling remote management or using firewall rules.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Change Admin Credentials

all

Immediately change router admin passwords to reduce risk if credentials are exposed, though this does not fix the underlying vulnerability.

🧯 If You Can't Patch

  • Isolate the router on a segmented network to limit exposure to internal threats.
  • Monitor network traffic for unauthorized access attempts to the /goform/getimage endpoint.

🔍 How to Verify

Check if Vulnerable:

Send a GET request to http://[router-ip]/goform/getimage and check if it returns configuration data without authentication.

Check Version:

Log into router admin panel and check firmware version in system settings, or use curl -s http://[router-ip]/ | grep -i version

Verify Fix Applied:

After patching, attempt the same request; it should return an error or require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access logs showing requests to /goform/getimage from unauthorized IPs

Network Indicators:

  • HTTP traffic to router IP on port 80/443 with GET /goform/getimage

SIEM Query:

source="router_logs" AND url="/goform/getimage" AND user="-"

🔗 References

📤 Share & Export