CVE-2022-24158

7.5 HIGH

📋 TL;DR

CVE-2022-24158 is a stack overflow vulnerability in Tenda AX3 routers running firmware version 16.03.12.10_CN. Attackers can exploit this by sending specially crafted requests to the fromSetIpMacBind function, causing a Denial of Service (DoS) that crashes the router. This affects users of Tenda AX3 routers with the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AX3
Versions: 16.03.12.10_CN
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Chinese firmware version. Other regional versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical reboot, potentially disrupting all network connectivity for extended periods.

🟠

Likely Case

Router becomes unresponsive, requiring manual reboot to restore functionality.

🟢

If Mitigated

Minimal impact if router is behind firewall with restricted access to management interface.

🌐 Internet-Facing: HIGH if router management interface is exposed to internet, as unauthenticated attackers can cause DoS.
🏢 Internal Only: MEDIUM as internal attackers or malware could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories. Exploitation requires network access to router's management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later firmware versions from Tenda

Vendor Advisory: Not publicly documented by vendor

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from Tenda website. 4. Upload and install firmware update. 5. Reboot router after installation.

🔧 Temporary Workarounds

Restrict Management Interface Access

linux

Block external access to router management interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Remote Management

all

Turn off remote management feature in router settings.

🧯 If You Can't Patch

  • Isolate router on separate network segment with strict access controls
  • Implement network monitoring for abnormal traffic patterns to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly 16.03.12.10_CN, the device is vulnerable.

Check Version:

curl -s http://router-ip/status | grep version or check router web interface

Verify Fix Applied:

Verify firmware version has been updated to a version later than 16.03.12.10_CN.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts to router management interface
  • Router crash/reboot logs
  • Abnormal traffic patterns to fromSetIpMacBind endpoint

Network Indicators:

  • Unusual HTTP POST requests to router management interface with large list parameters
  • Sudden drop in router responsiveness

SIEM Query:

source="router.log" AND ("crash" OR "reboot" OR "fromSetIpMacBind")

🔗 References

📤 Share & Export