CVE-2023-37719

9.8 CRITICAL

📋 TL;DR

CVE-2023-37719 is a critical stack overflow vulnerability in Tenda F1202 and FH1202 routers that allows remote code execution. Attackers can exploit this by sending specially crafted requests to the vulnerable fromP2pListFilter function. Users of affected Tenda router models with vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda F1202
  • Tenda FH1202
Versions: F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Other Tenda models may have similar vulnerabilities but are not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to execute arbitrary code, steal credentials, pivot to internal networks, or create persistent backdoors.

🟠

Likely Case

Remote code execution leading to device takeover, network traffic interception, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - If not internet-facing, still vulnerable to internal attackers or malware that reaches the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository. The vulnerability is in a web interface function accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. Download latest firmware for your model
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Turn off remote administration features to prevent external exploitation

Network segmentation

all

Isolate vulnerable routers from critical network segments

🧯 If You Can't Patch

  • Replace affected devices with patched or different vendor models
  • Implement strict firewall rules blocking all inbound traffic to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. Navigate to System Status or About page.

Check Version:

curl -s http://router-ip/status.asp | grep -i version

Verify Fix Applied:

Verify firmware version has been updated to a version later than the vulnerable ones listed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to router management interface
  • Multiple failed authentication attempts followed by successful access
  • Unexpected process execution or system reboots

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns indicating command and control communication
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND (url="*fromP2pListFilter*" OR method="POST" AND uri="*.asp")

🔗 References

📤 Share & Export