CVE-2022-24150

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda AX3 routers via command injection in the remoteIp parameter. Attackers can gain full control of affected devices, potentially compromising network security. Users running Tenda AX3 v16.03.12.10_CN firmware are affected.

💻 Affected Systems

Products:
  • Tenda AX3
Versions: v16.03.12.10_CN
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Chinese firmware version. Other regional variants may have different code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, and use the device as part of a botnet.

🟠

Likely Case

Attackers gain remote shell access to modify router settings, intercept credentials, and deploy cryptocurrency miners or other malware.

🟢

If Mitigated

If properly segmented and monitored, impact limited to isolated network segment with no critical assets.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - If router management interface is only accessible internally, risk is reduced but still significant for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repository. Exploitation requires sending crafted HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda website for latest firmware

Vendor Advisory: Not publicly documented by vendor

Restart Required: Yes

Instructions:

1. Visit Tenda support website. 2. Download latest firmware for AX3. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Network Segmentation

all

Isolate router management interface to trusted network segment only

🧯 If You Can't Patch

  • Replace affected router with different model or vendor
  • Implement strict firewall rules blocking all external access to router management ports (typically 80, 443, 8080)

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than v16.03.12.10_CN after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setSafeWanWebMan
  • Command execution patterns in system logs
  • Unexpected process creation

Network Indicators:

  • HTTP requests with shell metacharacters in parameters
  • Outbound connections from router to suspicious IPs

SIEM Query:

source="router.log" AND (url="/goform/setSafeWanWebMan" OR (param="remoteIp" AND value MATCHES "[;&|`$()]"))

🔗 References

📤 Share & Export