CVE-2023-37701

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda FH1203 routers by exploiting a stack overflow in the addWifiMacFilter function. Attackers can gain full control of affected devices by sending specially crafted requests containing malicious deviceId parameters. This affects all users running vulnerable firmware versions of Tenda FH1203 routers.

💻 Affected Systems

Products:
  • Tenda FH1203
Versions: V2.0.1.6 and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the router. The vulnerability is in the firmware itself, not dependent on specific configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to router compromise, credential theft, network traffic interception, and lateral movement to connected devices.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, or join the device to a botnet.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and not exposed to the internet.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or compromised internal devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories. The vulnerability requires no authentication and has a straightforward exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for FH1203. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the router's web interface

Log into router admin > Advanced > System Tools > Remote Management > Disable

Network Segmentation

all

Isolate the router management interface from untrusted networks

Configure firewall rules to block external access to port 80/443 on router IP

🧯 If You Can't Patch

  • Replace affected routers with different models from vendors with better security track records
  • Place routers behind dedicated firewalls with strict inbound filtering rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or System Tools > Firmware Upgrade

Check Version:

curl -s http://router-ip/status.asp | grep firmware_version

Verify Fix Applied:

Verify firmware version has been updated to a version later than V2.0.1.6

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/addWifiMacFilter
  • Multiple failed exploitation attempts
  • Sudden configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting device compromise
  • Exploitation attempts against router management interface

SIEM Query:

source="router_logs" AND (uri="/goform/addWifiMacFilter" OR deviceId="*[long_string]*")

🔗 References

📤 Share & Export