CVE-2023-49431

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Tenda AX9 routers that allows attackers to execute arbitrary commands on the device. The vulnerability exists in the 'mac' parameter of the /goform/SetOnlineDevName endpoint. Anyone using affected Tenda AX9 router versions is potentially vulnerable.

💻 Affected Systems

Products:
  • Tenda AX9
Versions: V22.03.01.46
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Tenda AX9 routers with the specific vulnerable firmware version. Other Tenda models or different firmware versions may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, intercept all network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Remote code execution leading to device takeover, network traffic monitoring, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if proper network segmentation, firewall rules, and access controls prevent external exploitation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this vulnerability allows unauthenticated remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, but requires specific targeting.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repositories. The vulnerability is straightforward to exploit with basic web request manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AX9. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Network Segmentation

all

Isolate router management interface to trusted network segments only

🧯 If You Can't Patch

  • Replace affected router with a different model or vendor
  • Implement strict firewall rules blocking access to port 80/443 on the router from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is V22.03.01.46, the device is vulnerable.

Check Version:

Access router web interface at http://[router-ip] and check System Status or Firmware Version page

Verify Fix Applied:

Verify firmware version has been updated to a version later than V22.03.01.46

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SetOnlineDevName
  • Commands containing shell metacharacters in URL parameters
  • Unexpected system command execution in router logs

Network Indicators:

  • HTTP requests to router with shell commands in parameters
  • Unusual outbound connections from router to external IPs

SIEM Query:

http.url:*goform/SetOnlineDevName* AND (http.param:*;* OR http.param:*|* OR http.param:*`* OR http.param:*$(*)

🔗 References

📤 Share & Export