CVE-2023-49040

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda AX1803 routers by sending specially crafted requests to the adslPwd parameter. Attackers can gain full control of affected devices without authentication. All users running vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda AX1803
Versions: v.1.0.0.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent malware, intercept all network traffic, pivot to internal networks, and use device as botnet node.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, and denial of service attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules and not internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains exploit details and proof-of-concept. Simple HTTP request with crafted parameter triggers vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support site for firmware updates
2. Download latest firmware for AX1803
3. Log into router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to trusted network

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking all external access to management ports
  • Change default credentials and implement strong authentication if supported

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or System Tools

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than v1.0.0.1 and test with known exploit payloads

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/fast_setting_internet_set with unusual adslPwd parameter values
  • Unusual process execution or network connections from router

Network Indicators:

  • HTTP POST requests to router IP on port 80/443 containing shell commands in parameters
  • Outbound connections from router to suspicious IPs

SIEM Query:

source="router_logs" AND (uri="/goform/fast_setting_internet_set" OR parameter="adslPwd")

🔗 References

📤 Share & Export