CVE-2023-46060

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda AC500 routers allows remote attackers to cause denial of service by sending specially crafted requests to the setVlanInfo component. This affects Tenda AC500 routers running firmware version 2.0.1.9. Attackers can exploit this without authentication to crash the device.

💻 Affected Systems

Products:
  • Tenda AC500
Versions: v2.0.1.9
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistent backdoor installation, and network infiltration.

🟠

Likely Case

Denial of service causing router reboot or crash, disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited to denial of service with no persistent impact if device auto-recovers after reboot.

🌐 Internet-Facing: HIGH - The vulnerable component is accessible remotely without authentication, making internet-facing devices immediately vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to disrupt network operations, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates exploitation via simple HTTP POST request. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Block External Access

linux

Configure firewall to block external access to router web interface on port 80/443.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Remote Management

all

Disable remote management feature in router settings to prevent external exploitation.

🧯 If You Can't Patch

  • Isolate affected routers in separate network segment with strict access controls
  • Implement network monitoring for exploitation attempts and anomalous traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is 2.0.1.9, device is vulnerable.

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version has been updated to a version later than 2.0.1.9.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/setVlanInfo
  • Router crash/reboot events in system logs
  • Unusual port parameter values in web logs

Network Indicators:

  • HTTP POST requests to /goform/setVlanInfo with malformed port parameter
  • Sudden loss of connectivity to router management interface

SIEM Query:

source="router_logs" AND uri_path="/goform/setVlanInfo" AND method="POST"

🔗 References

📤 Share & Export