CVE-2023-51952
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Tenda AX1803 routers via a stack overflow in the formSetIptv function. Attackers can exploit this by sending specially crafted requests to the adv.iptv.stbpvid parameter. All users of Tenda AX1803 v1.0.0.1 are affected.
💻 Affected Systems
- Tenda AX1803
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router leading to persistent backdoor installation, network traffic interception, and lateral movement to connected devices.
Likely Case
Remote code execution allowing attackers to modify router settings, intercept traffic, or use the router as a botnet node.
If Mitigated
Denial of service or limited information disclosure if exploit fails to achieve full code execution.
🎯 Exploit Status
Public technical details available showing exploitation via HTTP POST request to vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router web interface
Network segmentation
allIsolate router management interface to trusted network
🧯 If You Can't Patch
- Replace affected router with different model or vendor
- Implement strict firewall rules blocking access to router management interface from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under System Status or About page
Check Version:
curl -s http://router-ip/ | grep -i version or check web interface
Verify Fix Applied:
Verify firmware version is no longer v1.0.0.1 after update
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to formSetIptv endpoint with large adv.iptv.stbpvid parameter
- Router crash/reboot logs
- Unusual process execution
Network Indicators:
- HTTP traffic to router management port with abnormal parameter sizes
- Exploit pattern matching in network traffic
SIEM Query:
source="router_logs" AND (uri="/goform/setIptv" OR uri="/goform/formSetIptv") AND param_size>1000