CVE-2022-30033

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda TX9 Pro routers via a buffer overflow in the setIPv6Status() function of the httpd module. Attackers can exploit this by sending specially crafted HTTP requests to the router's web interface. This affects users running vulnerable firmware versions on Tenda TX9 Pro routers.

💻 Affected Systems

Products:
  • Tenda TX9 Pro
Versions: V22.03.02.10
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The web interface is typically enabled by default on these routers, making them immediately vulnerable to network-accessible attacks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, allowing attackers to intercept traffic, modify DNS settings, install malware, or pivot to internal networks.

🟠

Likely Case

Router compromise leading to network traffic interception, DNS hijacking, or denial of service through router crashes.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted web interface access, though internal attackers could still exploit.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains detailed exploit code and analysis. Exploitation requires network access to the router's web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not found in provided references

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download latest firmware for TX9 Pro. 3. Log into router web interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Wait for router to reboot.

🔧 Temporary Workarounds

Disable web interface remote access

all

Prevent external access to router's web management interface

Log into router → Advanced Settings → Remote Management → Disable

Disable IPv6 functionality

all

Turn off IPv6 to prevent exploitation via vulnerable function

Log into router → Network Settings → IPv6 → Disable

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking access to web interface ports (typically 80/443)
  • Implement network segmentation to isolate vulnerable router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: System Status → Firmware Version. If version is V22.03.02.10, device is vulnerable.

Check Version:

curl -s http://router-ip/ | grep -i firmware || Check web interface manually

Verify Fix Applied:

After updating firmware, verify version is no longer V22.03.02.10. Test by attempting to access setIPv6Status endpoint with malformed input.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/setIPv6Status with abnormal parameters
  • Router crash/reboot logs
  • Unusual process execution in router logs

Network Indicators:

  • HTTP POST requests to router IP on port 80 targeting /goform/setIPv6Status
  • Sudden router reboots or service interruptions

SIEM Query:

source="router_logs" AND (uri="/goform/setIPv6Status" OR message="buffer overflow" OR message="httpd crash")

🔗 References

📤 Share & Export