CVE-2022-24172
📋 TL;DR
CVE-2022-24172 is a stack overflow vulnerability in Tenda G1 and G3 routers that allows attackers to cause a Denial of Service (DoS) by sending specially crafted requests to the formAddDhcpBindRule function. This affects users of Tenda G1 and G3 routers running vulnerable firmware versions. The vulnerability can be exploited remotely without authentication.
💻 Affected Systems
- Tenda G1 router
- Tenda G3 router
📦 What is this software?
G1 Firmware by Tendacn
G3 Firmware by Tendacn
⚠️ Risk & Real-World Impact
Worst Case
Complete router crash requiring physical reboot, potentially disrupting all network connectivity for affected devices.
Likely Case
Router becomes unresponsive, requiring manual reboot to restore functionality.
If Mitigated
Limited impact if routers are behind firewalls with restricted WAN access.
🎯 Exploit Status
Proof of concept available in GitHub repository. Exploitation requires sending crafted HTTP request to router's web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates
2. If update available, download and flash via router web interface
3. Reboot router after update
4. Verify firmware version is no longer vulnerable
🔧 Temporary Workarounds
Restrict WAN Access
allBlock external access to router administration interface
Configure firewall to block incoming connections to router IP on ports 80/443
Disable Remote Management
allTurn off remote administration feature in router settings
Login to router admin panel → System → Remote Management → Disable
🧯 If You Can't Patch
- Replace affected routers with different models or brands
- Place routers behind additional firewall with strict ingress filtering
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface. If version is v15.11.0.17(9502)_CN, device is vulnerable.
Check Version:
Login to router web interface and check System Status or Firmware Update section
Verify Fix Applied:
Verify firmware version has changed from v15.11.0.17(9502)_CN to a newer version.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed HTTP requests to /goform/AddDhcpRules endpoint
- Router crash/reboot logs
- Unusual traffic patterns to router administration interface
Network Indicators:
- HTTP POST requests to /goform/AddDhcpRules with malformed parameters
- Sudden loss of connectivity to router
SIEM Query:
source="router.log" AND (uri="/goform/AddDhcpRules" OR message="crash" OR message="reboot")