CVE-2023-49047

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda AX1803 routers by exploiting a stack overflow in the device name setting function. Attackers can send specially crafted requests to trigger the overflow, potentially gaining full control of affected devices. All users running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Tenda AX1803
Versions: v1.0.0.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface which is typically enabled by default. No authentication bypass required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, credential theft, and use as pivot point for attacking other internal systems.

🟠

Likely Case

Router compromise allowing attackers to modify network settings, intercept traffic, deploy malware to connected devices, or join botnets for DDoS attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access, though internal attackers could still exploit if they gain network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and proof-of-concept available in public repositories. Exploitation requires sending crafted HTTP request to web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support website for firmware updates
2. Download latest firmware for AX1803
3. Log into router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router after installation

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to trusted network segment

🧯 If You Can't Patch

  • Replace affected device with different model/brand
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status > Firmware Version

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is no longer v1.0.0.1 after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setDeviceName
  • Multiple failed authentication attempts followed by device name change requests
  • Router reboot logs after suspicious requests

Network Indicators:

  • HTTP POST requests to router IP with long devName parameter
  • Unusual outbound connections from router after exploitation

SIEM Query:

source="router_logs" AND (uri="/goform/setDeviceName" OR method="POST" AND uri CONTAINS "setDeviceName")

🔗 References

📤 Share & Export