CVE-2023-48111
📋 TL;DR
This vulnerability in Tenda AX1803 routers allows attackers to trigger a stack overflow via the time parameter in the saveParentControlInfo function, leading to Denial of Service (DoS). Attackers can crash the device remotely, disrupting network connectivity. Only users running Tenda AX1803 v1.0.0.1 are affected.
💻 Affected Systems
- Tenda AX1803
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical power cycle, extended network downtime, and potential for remote code execution if stack overflow can be controlled.
Likely Case
Router becomes unresponsive, requiring reboot and causing temporary network disruption for connected devices.
If Mitigated
No impact if device is patched or not exposed to untrusted networks.
🎯 Exploit Status
The vulnerability is well-documented with public proof-of-concept available. Exploitation requires sending a specially crafted HTTP request to the router's web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: Yes
Instructions:
1. Check Tenda's official website for firmware updates. 2. If update available, download and install via router web interface. 3. Reboot router after installation.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router web interface
Access router admin panel -> Advanced Settings -> Remote Management -> Disable
Restrict web interface access
allLimit access to router management interface to trusted IPs only
Access router admin panel -> Security -> Access Control -> Add trusted IP ranges
🧯 If You Can't Patch
- Replace vulnerable router with different model or vendor
- Place router behind firewall with strict inbound filtering
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface: Login -> System Status -> Firmware Version
Check Version:
curl -s http://router-ip/goform/getStatus | grep version
Verify Fix Applied:
Verify firmware version is no longer v1.0.0.1 after update
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /goform/saveParentControlInfo with malformed time parameter
- Router crash/reboot logs
- Unusual traffic patterns to router management interface
Network Indicators:
- HTTP POST requests with unusually long time parameter values
- Traffic to router port 80/443 from unexpected sources
SIEM Query:
source="router.log" AND (url="/goform/saveParentControlInfo" OR "ParentControlInfo") AND time_parameter_length>100