CVE-2023-50989

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda i29 routers through the pingSet function. Attackers can gain full control of affected devices, potentially compromising network security. All users of Tenda i29 v1.0 V1.0.0.5 are affected.

💻 Affected Systems

Products:
  • Tenda i29
Versions: v1.0 V1.0.0.5
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the router

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network compromise, data exfiltration, and use as pivot point for internal attacks

🟠

Likely Case

Router compromise allowing traffic interception, DNS manipulation, and credential theft

🟢

If Mitigated

Limited impact if device is isolated with strict network segmentation and access controls

🌐 Internet-Facing: HIGH - Routers are typically internet-facing and vulnerable to remote exploitation
🏢 Internal Only: MEDIUM - Could be exploited from internal networks if attacker gains initial access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on GitHub, command injection via pingSet parameter

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://tenda.com

Restart Required: No

Instructions:

Check Tenda website for firmware updates. If available, download and install through web interface.

🔧 Temporary Workarounds

Disable remote management

all

Turn off remote administration access to prevent external exploitation

Network segmentation

all

Isolate router management interface to trusted network segment only

🧯 If You Can't Patch

  • Replace affected devices with patched or alternative models
  • Implement strict firewall rules to block access to router management interface from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface. If version is v1.0.0.5, device is vulnerable.

Check Version:

Check web interface at http://router-ip or use nmap/router fingerprinting

Verify Fix Applied:

Verify firmware version has been updated to a version later than v1.0.0.5

📡 Detection & Monitoring

Log Indicators:

  • Unusual ping commands in router logs
  • Multiple failed authentication attempts to management interface

Network Indicators:

  • Unexpected outbound connections from router
  • DNS queries to suspicious domains

SIEM Query:

source="router_logs" AND ("pingSet" OR "command injection" OR unusual shell commands)

🔗 References

📤 Share & Export