CVE-2023-45480

9.8 CRITICAL

📋 TL;DR

CVE-2023-45480 is a critical stack-based buffer overflow vulnerability in Tenda AC10 routers. Attackers can exploit this by sending specially crafted requests to the 'src' parameter, potentially allowing remote code execution. This affects users of Tenda AC10 routers running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AC10
Versions: US_AC10V4.0si_V16.03.10.13_cn
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only confirmed for this specific firmware version. Other versions may be affected but not verified.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the router, enabling network compromise, data interception, and lateral movement into connected devices.

🟠

Likely Case

Router becomes part of a botnet, suffers denial of service, or allows attacker to modify network settings and intercept traffic.

🟢

If Mitigated

Attack is blocked at network perimeter, limiting impact to router availability with no internal network compromise.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web interfaces exposed.
🏢 Internal Only: MEDIUM - If router management interface is only accessible internally, risk is reduced but still significant.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository. Stack overflow vulnerabilities in embedded devices are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC10 model
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Network Segmentation

all

Isolate router management interface to trusted network segment

🧯 If You Can't Patch

  • Replace vulnerable router with different model/brand
  • Implement strict firewall rules blocking all external access to router management ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version matches US_AC10V4.0si_V16.03.10.13_cn, device is vulnerable.

Check Version:

Login to router admin interface and check System Status or Firmware Version page.

Verify Fix Applied:

Verify firmware version has changed from vulnerable version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to router management interface
  • Multiple failed login attempts followed by buffer overflow patterns

Network Indicators:

  • Unusual traffic to router management ports (typically 80/443)
  • Exploit pattern matches in network traffic

SIEM Query:

source_ip=external AND dest_port=80 AND http_uri CONTAINS 'src' AND payload_size>threshold

🔗 References

📤 Share & Export