CVE-2022-24160
📋 TL;DR
CVE-2022-24160 is a stack overflow vulnerability in Tenda AX3 routers that allows attackers to cause Denial of Service (DoS) by sending specially crafted requests to the devName parameter. This affects Tenda AX3 v16.03.12.10_CN routers, potentially disrupting network connectivity for users.
💻 Affected Systems
- Tenda AX3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router crash requiring physical reboot, persistent network downtime until manual intervention.
Likely Case
Temporary router reboot or service disruption affecting all connected devices.
If Mitigated
Minimal impact if router is behind firewall with restricted WAN access.
🎯 Exploit Status
Public GitHub repository contains proof-of-concept; exploitation requires network access to router web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions than v16.03.12.10_CN
Vendor Advisory: Not publicly documented by vendor
Restart Required: Yes
Instructions:
1. Log into router admin interface 2. Navigate to firmware update section 3. Check for and install latest firmware 4. Reboot router after update
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router web interface
Restrict Admin Interface Access
allLimit admin interface access to trusted IP addresses only
🧯 If You Can't Patch
- Place router behind firewall with strict inbound rules
- Disable UPnP and ensure no port forwarding to router admin interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface matches v16.03.12.10_CN
Check Version:
Login to router web interface and check System Status or Firmware Update page
Verify Fix Applied:
Verify firmware version is updated to newer release
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts
- Unusual POST requests to formSetDeviceName endpoint
- Router reboot logs
Network Indicators:
- Unusual traffic to router port 80/443 from external sources
- HTTP requests with long devName parameters
SIEM Query:
source="router_logs" AND ("formSetDeviceName" OR "devName" AND length>100)