CVE-2023-30135

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Tenda AC18 routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by sending specially crafted requests to the vulnerable setUsbUnload function. This affects users running the vulnerable firmware version on Tenda AC18 routers.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: v15.03.05.19(6318_)_cn
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Chinese firmware version mentioned. Other versions or regional variants may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, and network surveillance capabilities.

🟢

If Mitigated

Limited impact if device is behind strict firewall rules, not internet-facing, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web interface function and requires no authentication. Public GitHub repository contains exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. Download latest firmware for AC18
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router management interface

Network segmentation

all

Isolate router management interface to trusted network segment

🧯 If You Can't Patch

  • Replace affected router with different model or vendor
  • Implement strict firewall rules blocking all external access to router management ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version matches v15.03.05.19(6318_)_cn, device is vulnerable.

Check Version:

Check router web interface or use: curl -s http://router-ip/login/Auth

Verify Fix Applied:

Verify firmware version has been updated to a newer version than v15.03.05.19(6318_)_cn

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to setUsbUnload endpoint
  • Suspicious command execution in system logs
  • Multiple failed login attempts followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs from router
  • Unexpected port openings on router

SIEM Query:

source="router_logs" AND (uri="/goform/setUsbUnload" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export