CVE-2023-37144

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC10 routers by injecting malicious commands into the mac parameter of the formWriteFacMac function. Attackers can gain full control of affected devices, potentially compromising network security. Users running Tenda AC10 v15.03.06.26 firmware are affected.

💻 Affected Systems

Products:
  • Tenda AC10
Versions: v15.03.06.26
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific firmware version. Other Tenda models or firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to other network devices.

🟠

Likely Case

Router compromise allowing attackers to modify DNS settings, intercept traffic, deploy malware to connected devices, or use the router as part of a botnet.

🟢

If Mitigated

Limited impact if device is behind strict firewall rules, not internet-facing, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, but requires local network presence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository. Command injection vulnerabilities are typically easy to weaponize once details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates. 2. Download latest firmware for AC10 model. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Network Segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace affected router with different model or vendor
  • Implement strict firewall rules blocking all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly v15.03.06.26, device is vulnerable.

Check Version:

Login to router admin interface and check System Status or Firmware Update section

Verify Fix Applied:

Verify firmware version has changed from v15.03.06.26 to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected firmware modification attempts

Network Indicators:

  • Unusual outbound connections from router
  • DNS hijacking patterns
  • Traffic redirection to suspicious IPs

SIEM Query:

source="router_logs" AND ("formWriteFacMac" OR "mac parameter" OR command_injection)

🔗 References

📤 Share & Export