CVE-2022-30474
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Tenda AC Series routers via a heap overflow in the httpd module when processing /goform/saveParentControlInfo requests. Attackers can gain full control of affected routers without authentication. Users of Tenda AC18 routers with firmware version 15.03.05.19(6318) are affected.
💻 Affected Systems
- Tenda AC Series Router AC18
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router compromise leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to connected devices.
Likely Case
Router takeover enabling DNS hijacking, credential harvesting, and botnet recruitment for DDoS attacks.
If Mitigated
Limited impact if routers are behind firewalls with strict inbound filtering and network segmentation.
🎯 Exploit Status
Public proof-of-concept code exists in GitHub repositories. Exploitation requires sending crafted HTTP POST requests to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: Yes
Instructions:
1. Check Tenda official website for firmware updates. 2. If update available, download and install via router web interface. 3. Reboot router after installation. 4. Verify firmware version changed from vulnerable version.
🔧 Temporary Workarounds
Disable Parent Control Feature
allDisable the Parent Control functionality to remove access to the vulnerable /goform/saveParentControlInfo endpoint.
Restrict WAN Access
allConfigure firewall rules to block external access to router administration interface (typically port 80/443).
🧯 If You Can't Patch
- Replace affected routers with different models or brands that receive security updates
- Place routers behind dedicated firewalls with strict inbound filtering rules
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface (typically under System Status or About page). If version is exactly AC18_V15.03.05.19(6318), device is vulnerable.
Check Version:
No CLI command available. Must check via router web interface at http://router_ip/ or via mobile app.
Verify Fix Applied:
Verify firmware version has changed from AC18_V15.03.05.19(6318) to a newer version after update.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /goform/saveParentControlInfo with unusual payload length or content
- Router crash/restart logs following POST requests
Network Indicators:
- Unusual outbound connections from router to unknown IPs
- DNS queries to suspicious domains from router
SIEM Query:
http.method:POST AND http.uri:"/goform/saveParentControlInfo" AND (bytes_out > 1000 OR contains(http.user_agent, "curl"))