CVE-2022-24152

7.5 HIGH

📋 TL;DR

CVE-2022-24152 is a stack overflow vulnerability in Tenda AX3 routers running firmware version 16.03.12.10_CN. Attackers can exploit this by sending specially crafted requests to the fromSetRouteStatic function, causing a denial of service that crashes the router. This affects users of Tenda AX3 routers with the vulnerable Chinese firmware version.

💻 Affected Systems

Products:
  • Tenda AX3
Versions: v16.03.12.10_CN
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Chinese firmware version (CN). International versions may not be vulnerable. The web management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical reboot, potential remote code execution if stack overflow can be controlled to execute arbitrary code (though not confirmed in this CVE).

🟠

Likely Case

Router becomes unresponsive and requires reboot, disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though LAN exploitation remains possible.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this vulnerability can be exploited remotely via the web interface.
🏢 Internal Only: HIGH - Even if not internet-facing, attackers on the local network can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to the router's web interface. The GitHub reference contains proof-of-concept code showing how to trigger the overflow via the list parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda website for firmware updates beyond v16.03.12.10_CN

Vendor Advisory: Not publicly documented by Tenda

Restart Required: Yes

Instructions:

1. Log into Tenda router web interface. 2. Navigate to System Tools > Firmware Upgrade. 3. Download latest firmware from Tenda website. 4. Upload and install firmware update. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Change Default Credentials

all

Use strong unique password to make authentication harder

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict access controls
  • Implement network monitoring for abnormal requests to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface: System Status > Firmware Version. If version is exactly 16.03.12.10_CN, you are vulnerable.

Check Version:

No CLI command - check via web interface at 192.168.0.1 or router IP

Verify Fix Applied:

After firmware update, verify version has changed from 16.03.12.10_CN to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Router crash/reboot logs
  • Multiple failed authentication attempts followed by large POST requests to fromSetRouteStatic

Network Indicators:

  • Unusual HTTP POST requests to router management interface with large list parameter values

SIEM Query:

source="router_logs" AND (event="crash" OR event="reboot") OR http_method="POST" AND uri="*/fromSetRouteStatic" AND content_length>1000

🔗 References

📤 Share & Export