CVE-2022-24154
📋 TL;DR
This vulnerability is a stack overflow in Tenda AX3 routers running firmware version 16.03.12.10_CN. Attackers can send specially crafted rebootTime parameter to the formSetRebootTimer function, causing a denial of service by crashing the device. Users of affected Tenda AX3 routers with this specific firmware are at risk.
💻 Affected Systems
- Tenda AX3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical power cycle, potentially leading to extended network downtime and loss of connectivity for all connected devices.
Likely Case
Router becomes unresponsive, requiring manual reboot to restore functionality, causing temporary network disruption.
If Mitigated
If properly segmented and firewalled, impact limited to isolated network segment with minimal business disruption.
🎯 Exploit Status
Public GitHub repository contains proof-of-concept code. Exploitation requires network access to router's web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda official website for firmware updates
2. If update available, download and upload via router web interface
3. Factory reset recommended after update
4. Verify new firmware version
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router management interface
Network Segmentation
allIsolate router management interface to trusted network only
🧯 If You Can't Patch
- Replace affected router with different model or vendor
- Implement network monitoring for DoS attempts against router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under System Status or About page
Check Version:
Check via router web interface or SSH if enabled: cat /proc/version
Verify Fix Applied:
Verify firmware version is no longer v16.03.12.10_CN
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to formSetRebootTimer endpoint
- Router crash/reboot logs
- Unusual parameter values in rebootTime field
Network Indicators:
- HTTP POST requests with malformed rebootTime parameter to router IP
- Sudden loss of router connectivity
SIEM Query:
source="router_logs" AND (uri_path="/goform/SetRebootTimer" OR message="rebootTime")