CVE-2023-27019

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical stack overflow vulnerability in Tenda AC10 routers that allows attackers to execute arbitrary code or cause denial of service. Attackers can exploit this by sending specially crafted payloads to the vulnerable function. Users of affected Tenda AC10 router models with the specified firmware version are at risk.

💻 Affected Systems

Products:
  • Tenda AC10 router
Versions: US_AC10V4.0si_V16.03.10.13_cn
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only specific firmware version mentioned in CVE is confirmed affected. Other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement into connected networks.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset and disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict inbound filtering, though internal threats remain possible.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Internal attackers on the LAN could exploit this vulnerability to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains technical details and likely exploit code. Stack overflow vulnerabilities in embedded devices are frequently weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in CVE references

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. If update available, download and flash firmware
3. Factory reset router after update
4. Reconfigure with secure settings

🔧 Temporary Workarounds

Disable remote management

all

Prevent external exploitation by disabling WAN-side management access

Network segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace affected router with different model/brand that receives security updates
  • Place router behind dedicated firewall with strict inbound filtering rules

🔍 How to Verify

Check if Vulnerable:

Check router web interface or serial console for firmware version matching US_AC10V4.0si_V16.03.10.13_cn

Check Version:

Check router web interface at 192.168.0.1 or 192.168.1.1 under System Status or About sections

Verify Fix Applied:

Verify firmware version has been updated to a newer release than the vulnerable version

📡 Detection & Monitoring

Log Indicators:

  • Router crash/reboot logs
  • Unusual traffic patterns to router management interface
  • Memory corruption errors in system logs

Network Indicators:

  • Unusual payloads sent to router management ports
  • Traffic patterns matching known exploit signatures

SIEM Query:

source="router_logs" AND ("crash" OR "reboot" OR "memory" OR "overflow")

🔗 References

📤 Share & Export