CVE-2022-24162

7.5 HIGH

📋 TL;DR

CVE-2022-24162 is a stack overflow vulnerability in Tenda AX3 routers running firmware version 16.03.12.10_CN. Attackers can exploit this by sending specially crafted requests to the saveParentControlInfo function, causing a Denial of Service (DoS) that crashes the device. This affects users of Tenda AX3 routers with the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AX3
Versions: v16.03.12.10_CN
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Chinese firmware version. Other regional versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical power cycle, potentially allowing persistent DoS attacks that render the device unusable until manually reset.

🟠

Likely Case

Temporary service disruption where the router reboots automatically or requires manual restart, interrupting network connectivity for connected devices.

🟢

If Mitigated

Minimal impact if the router has automatic recovery mechanisms or if network redundancy exists.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via network requests, making internet-facing routers directly vulnerable to remote attacks.
🏢 Internal Only: MEDIUM - Internal attackers on the local network could also exploit this vulnerability to cause DoS.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept code is publicly available in GitHub repositories. The vulnerability requires sending crafted HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later firmware versions from Tenda

Vendor Advisory: Not publicly documented by Tenda

Restart Required: Yes

Instructions:

1. Log into Tenda AX3 router admin interface. 2. Navigate to System Tools > Firmware Upgrade. 3. Check for and install the latest firmware version. 4. Reboot the router after installation.

🔧 Temporary Workarounds

Disable Parental Control Feature

all

Disable the parental control functionality that contains the vulnerable saveParentControlInfo function

Network Segmentation

all

Place the router behind a firewall that restricts access to its administrative interface

🧯 If You Can't Patch

  • Implement network access controls to restrict who can access the router's administrative interface
  • Monitor router logs for unusual reboot patterns or failed authentication attempts to the parental control feature

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly 16.03.12.10_CN, the device is vulnerable.

Check Version:

Connect to router admin interface and navigate to System Status or System Tools section

Verify Fix Applied:

After updating firmware, verify the version number has changed from 16.03.12.10_CN to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed requests to parental control endpoints
  • Unexpected router reboots
  • HTTP requests with malformed time parameters

Network Indicators:

  • Unusual HTTP POST requests to router's parental control API endpoints
  • Traffic patterns indicating DoS attempts against router

SIEM Query:

source="router_logs" AND (uri="*/goform/saveParentControlInfo" OR message="*parental*control*" OR event="router_reboot")

🔗 References

📤 Share & Export