CVE-2023-27017

9.8 CRITICAL

📋 TL;DR

CVE-2023-27017 is a critical stack overflow vulnerability in Tenda AC10 routers that allows attackers to cause denial of service or execute arbitrary code via crafted network requests. This affects users of Tenda AC10 routers running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Tenda AC10
Versions: US_AC10V4.0si_V16.03.10.13_cn and likely earlier versions
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware version for Chinese market; other regional variants may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, network traffic interception, and lateral movement to connected devices.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset and temporary network disruption.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and updated firmware.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Attackers could exploit from compromised internal devices or via phishing/malware.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed analysis and likely exploit code; stack overflow vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support for firmware updates
2. Download latest firmware from official Tenda website
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Network Segmentation

all

Place router in isolated network segment with strict firewall rules

🧯 If You Can't Patch

  • Replace vulnerable router with supported model
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

Login to router web interface and check firmware version in system information

Verify Fix Applied:

Verify firmware version has been updated to a version later than V16.03.10.13

📡 Detection & Monitoring

Log Indicators:

  • Router crash/reboot events
  • Unusual traffic patterns to router management interface
  • Failed login attempts

Network Indicators:

  • Unusual payloads sent to router management ports
  • Traffic patterns matching known exploit signatures

SIEM Query:

source="router_logs" AND (event="crash" OR event="reboot") OR dest_port=80 AND http_uri contains "sub_45DC58"

🔗 References

📤 Share & Export