CVE-2022-29591

9.8 CRITICAL

📋 TL;DR

CVE-2022-29591 is a buffer overflow vulnerability in the SetNetControlList function of Tenda TX9 Pro routers running firmware version 22.03.02.10. This allows remote attackers to execute arbitrary code on affected devices. Users of Tenda TX9 Pro routers with the vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Tenda TX9 Pro
Versions: 22.03.02.10
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific firmware version. Devices with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Router takeover allowing attackers to modify DNS settings, redirect traffic, or deploy malware to connected devices.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Could be exploited from internal networks if attackers gain initial access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories. Exploitation appears straightforward based on available information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later firmware versions (check Tenda website for latest)

Vendor Advisory: Not publicly documented by vendor

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from Tenda website. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router management interface

Login to router admin → System Tools → Remote Management → Disable

Network segmentation

all

Isolate router management interface to trusted network segments only

🧯 If You Can't Patch

  • Replace affected devices with different models or brands
  • Implement strict firewall rules blocking all inbound traffic to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or Firmware Upgrade section

Check Version:

Login to router web interface and navigate to System Status page

Verify Fix Applied:

Confirm firmware version is newer than 22.03.02.10 after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic patterns to router management interface
  • Multiple failed login attempts followed by buffer overflow patterns

Network Indicators:

  • Unexpected connections to router management ports (typically 80/443)
  • Traffic patterns matching known exploit signatures

SIEM Query:

source_ip=external AND dest_port=80 AND dest_ip=router_management AND http_uri CONTAINS 'SetNetControlList'

🔗 References

📤 Share & Export