CVE-2022-28557

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Tenda AC15 routers that allows attackers to execute arbitrary commands on the device. When combined with CVE-2021-44971, it enables unconditional remote code execution. Users of affected Tenda AC15 router firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda AC15 router
Versions: US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin and likely earlier versions
Operating Systems: Embedded Linux on Tenda hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the web management interface. Combined with CVE-2021-44971 provides unconditional RCE.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to router takeover, network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Router compromise allowing attackers to modify network settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted web interface access and proper network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces exposed.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to the web interface, but combined with CVE-2021-44971 authentication bypass makes it unauthenticated RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not found in provided references

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC15
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Restrict web interface access

linux

Use firewall rules to limit access to router management interface

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Replace affected Tenda AC15 router with different model or vendor
  • Place router behind dedicated firewall with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or About page

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setsambacfg
  • Command execution patterns in system logs
  • Unexpected process creation

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to unexpected destinations
  • Port scanning originating from router

SIEM Query:

source="router.log" AND (uri="/goform/setsambacfg" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export