CVE-2023-47456

9.1 CRITICAL

📋 TL;DR

Tenda AX1806 routers running firmware V1.0.0.1 contain a stack overflow vulnerability in the wireless repeater configuration function. This allows remote attackers to execute arbitrary code on the device, potentially gaining full control. All users of affected routers are at risk.

💻 Affected Systems

Products:
  • Tenda AX1806
Versions: V1.0.0.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default wireless repeater configuration function. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to connected devices, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attacker to modify router settings, intercept traffic, or use device as proxy for attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and strong network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository. Exploitation requires network access to router's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda support site for firmware updates
2. Download latest firmware for AX1806
3. Log into router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable Wireless Repeater Function

all

Disable the vulnerable wireless repeater feature to prevent exploitation

Restrict Web Interface Access

all

Limit access to router admin interface to trusted IP addresses only

🧯 If You Can't Patch

  • Isolate affected router in separate VLAN with strict firewall rules
  • Implement network monitoring for unusual traffic patterns from router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status. If version is V1.0.0.1, device is vulnerable.

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version has been updated to a version later than V1.0.0.1

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setWirelessRepeat
  • Multiple failed authentication attempts to router admin

Network Indicators:

  • Unusual outbound connections from router
  • Traffic spikes from router to unknown external IPs

SIEM Query:

source="router-logs" AND (uri="/goform/setWirelessRepeat" OR method="POST" AND uri LIKE "%/goform/%")

🔗 References

📤 Share & Export