CVE-2023-40839

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC6 routers by sending specially crafted requests to the 'formSetIptv' function. Attackers can gain full control of affected devices without authentication. All users running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Tenda AC6 wireless router
Versions: US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. The web management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing installation of persistent malware, network traffic interception, lateral movement to internal networks, and use as botnet nodes.

🟠

Likely Case

Router compromise leading to DNS hijacking, credential theft from network traffic, and denial of service attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces exposed.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but external exposure is primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repositories. Exploitation requires sending HTTP POST requests with malicious parameters to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC6 model
3. Access router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Network segmentation

all

Isolate router management interface to trusted network

🧯 If You Can't Patch

  • Disable UPnP and ensure router is behind a firewall with strict inbound rules
  • Implement network monitoring for unusual outbound connections from router

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status. If version is V15.03.05.16 or earlier, device is likely vulnerable.

Check Version:

Login to router web interface and check System Status page, or use: curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version has been updated to a version later than V15.03.05.16. Test by attempting to access the vulnerable endpoint with test payloads.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goform/setIptv with unusual parameters
  • Command execution attempts in system logs
  • Unusual process creation from web server

Network Indicators:

  • Unusual outbound connections from router IP
  • DNS queries to suspicious domains from router
  • Unexpected SSH/Telnet connections originating from router

SIEM Query:

source="router_logs" AND (uri="/goform/setIptv" OR (method="POST" AND uri CONTAINS "setIptv"))

🔗 References

📤 Share & Export