CVE-2023-27079

7.5 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Tenda G103 routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending specially crafted network packets to vulnerable routers. This affects all users running Tenda G103 routers with vulnerable firmware.

💻 Affected Systems

Products:
  • Tenda G103 router
Versions: v1.0.05
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Tenda G103 model with specific firmware version. Other Tenda models may have similar vulnerabilities but are not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise allowing attacker to intercept all network traffic, modify router settings, install persistent backdoors, and pivot to internal network devices.

🟠

Likely Case

Information disclosure and limited command execution allowing attacker to extract router credentials, configuration data, and potentially disrupt network connectivity.

🟢

If Mitigated

No impact if router is not internet-facing and network segmentation prevents access to management interfaces.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices and this vulnerability can be exploited remotely via crafted packets.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains exploit details and proof-of-concept. The vulnerability appears to be exploitable without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. If update available, download and install via router web interface
3. Reboot router after installation
4. Verify firmware version has changed from v1.0.05

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface from untrusted networks

Access Control Lists

all

Restrict access to router management interface to trusted IPs only

🧯 If You Can't Patch

  • Replace vulnerable router with different model or vendor
  • Place router behind firewall with strict inbound/outbound rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at 192.168.0.1 or 192.168.1.1, login and navigate to System Status or About page

Check Version:

curl -s http://192.168.0.1/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is no longer v1.0.05 and attempt to access known vulnerable endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual traffic to router management ports (typically 80, 443, 8080)
  • Suspicious packets containing shell metacharacters or command sequences
  • Outbound connections from router to unknown IPs

SIEM Query:

source="router_logs" AND ("cmd" OR "exec" OR "system") AND NOT user="admin"

🔗 References

📤 Share & Export