CVE-2023-38930

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Tenda routers via a stack overflow in the addWifiMacFilter function. Attackers can exploit this by sending specially crafted requests containing malicious deviceId parameters. Users of vulnerable Tenda router models with affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda AC7
  • Tenda F1203
  • Tenda AC5
  • Tenda AC9
  • Tenda FH1205
Versions: AC7 V1.0,V15.03.06.44; F1203 V2.0.1.6; AC5 V1.0,V15.03.06.28; AC9 V3.0,V15.03.06.42_multi; FH1205 V2.0.0.7(775)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected firmware versions are vulnerable. The vulnerability is in the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to other devices on the network.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Could still be exploited via phishing or compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories. The exploit requires no authentication and has low complexity due to the stack overflow vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. If update available, download and install via web interface
3. Reboot router after installation
4. Verify firmware version is no longer vulnerable

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate vulnerable routers from critical network segments

🧯 If You Can't Patch

  • Replace vulnerable routers with patched or different vendor models
  • Implement strict firewall rules blocking all inbound traffic to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to System Status or About page, check firmware version against affected versions list.

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After updating, verify firmware version is newer than affected versions. Test if addWifiMacFilter function still accepts malformed deviceId parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/addWifiMacFilter
  • Large deviceId parameter values in web logs
  • Router crash/reboot events

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router_logs" AND (uri="/goform/addWifiMacFilter" OR deviceId.length>100)

🔗 References

📤 Share & Export