CVE-2023-49043

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Tenda AX1803 routers allows remote attackers to execute arbitrary code by sending specially crafted data to the wpapsk_crypto parameter. This affects all users running the vulnerable firmware version, potentially giving attackers full control over affected devices.

💻 Affected Systems

Products:
  • Tenda AX1803
Versions: v1.0.0.1
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the wireless repeater function configuration interface. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Could still be exploited from compromised internal hosts or via phishing attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and proof-of-concept available in public GitHub repository. Exploitation appears straightforward with publicly documented payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not found

Restart Required: Yes

Instructions:

1. Check Tenda support website for firmware updates
2. Download latest firmware for AX1803
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update completes

🔧 Temporary Workarounds

Disable Wireless Repeater Function

all

Disable the vulnerable fromSetWirelessRepeat functionality if not required

Network Segmentation

all

Place router on isolated network segment with strict firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit WAN access to router management interface
  • Monitor for unusual network traffic patterns and connection attempts to router management ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly 1.0.0.1, device is vulnerable.

Check Version:

Check via router web interface at http://router_ip or via SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.0.0.1

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to router management interface
  • Large payloads sent to wpapsk_crypto parameter
  • Unexpected process execution or system reboots

Network Indicators:

  • Unusual outbound connections from router
  • Traffic spikes on router management ports
  • Suspicious payloads in HTTP requests to router

SIEM Query:

source="router_logs" AND (uri="*fromSetWirelessRepeat*" OR param="*wpapsk_crypto*") AND size>1000

🔗 References

📤 Share & Export