CVE-2022-24164
📋 TL;DR
This vulnerability is a stack overflow in Tenda G1 and G3 routers that allows attackers to cause Denial of Service (DoS) by sending specially crafted requests to the DnsHijackRule parameter. Attackers can crash the router's web interface service, disrupting network connectivity. Only users of specific Tenda router models with vulnerable firmware versions are affected.
💻 Affected Systems
- Tenda G1 Router
- Tenda G3 Router
📦 What is this software?
G1 Firmware by Tendacn
G3 Firmware by Tendacn
⚠️ Risk & Real-World Impact
Worst Case
Router becomes completely unresponsive, requiring physical power cycle and potentially bricking the device if memory corruption leads to permanent damage.
Likely Case
Router web interface service crashes, disrupting administrative access and potentially affecting DNS functionality until service restart.
If Mitigated
If router is behind firewall with restricted WAN access, impact is limited to internal network attackers only.
🎯 Exploit Status
Exploit requires network access to router's web interface port (typically 80/443). The GitHub reference contains proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
Check Tenda website for firmware updates. If available, download latest firmware and upload via router web interface under System Tools > Firmware Upgrade.
🔧 Temporary Workarounds
Restrict Web Interface Access
linuxBlock external access to router web interface using firewall rules
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Change Default Ports
allChange router web interface to non-standard ports if supported
🧯 If You Can't Patch
- Replace vulnerable routers with different models or brands
- Place routers behind dedicated firewall with strict ingress filtering
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under System Status > Firmware Version
Check Version:
curl -s http://router-ip/ | grep -i firmware
Verify Fix Applied:
Verify firmware version is newer than v15.11.0.17(9502)_CN
📡 Detection & Monitoring
Log Indicators:
- Web interface service crashes
- Unusual POST requests to formSetVirtualSer endpoint
- Large DnsHijackRule parameter values in logs
Network Indicators:
- Multiple POST requests to router port 80/443 with oversized parameters
- Sudden loss of router web interface responsiveness
SIEM Query:
source="router.log" AND ("formSetVirtualSer" OR "DnsHijackRule") AND bytes > 1000