CVE-2022-30425
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on Tenda HG6 routers by injecting malicious commands into the pingAddr and traceAddr parameters via crafted POST requests. Attackers can gain full control of affected devices. All users running vulnerable firmware versions are affected.
💻 Affected Systems
- Tenda HG6
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent backdoors, pivot to internal networks, intercept traffic, or use device as botnet node.
Likely Case
Remote code execution leading to device takeover, credential theft, DNS hijacking, or denial of service.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.
🎯 Exploit Status
Simple HTTP POST request with command injection payload. Public exploit code available in vulnerability disclosure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.tendacn.com/
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates. 2. Download latest firmware for HG6. 3. Log into router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload new firmware file. 6. Wait for reboot.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict access to router web interface using firewall rules
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
Disable Remote Management
allTurn off WAN access to web interface in router settings
🧯 If You Can't Patch
- Place router behind firewall with strict inbound rules blocking all WAN access to management interface
- Implement network segmentation to isolate router from critical internal systems
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status or System Tools > Firmware Upgrade
Check Version:
curl -s http://router_ip/goform/getStatus | grep version
Verify Fix Applied:
Verify firmware version is newer than 3.3.0-210926 and test with known exploit payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/ping/trace endpoints
- Commands like ;, |, &, $() in URL parameters
- Multiple failed login attempts followed by ping/trace requests
Network Indicators:
- HTTP POST to /goform/ping or /goform/trace with shell metacharacters
- Outbound connections from router to unusual IPs/ports
SIEM Query:
source="router_logs" AND (url="/goform/ping" OR url="/goform/trace") AND (param="pingAddr" OR param="traceAddr") AND (value="*;*" OR value="*|*" OR value="*&*" OR value="*$(*)")