CVE-2024-0992

7.2 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability exists in Tenda i6 routers version 1.0.0.9(3857). Remote attackers can exploit this via the HTTP interface to potentially execute arbitrary code or crash the device. This affects all users running the vulnerable firmware.

💻 Affected Systems

Products:
  • Tenda i6 router
Versions: 1.0.0.9(3857)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the httpd component handling WiFi SSID configuration. Default configuration is vulnerable as the web management interface is typically enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, router takeover, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Device crash causing denial of service, potentially requiring physical reset and disrupting network connectivity.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted HTTP access, though still vulnerable to internal threats.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP interface, which is typically internet-accessible on routers.
🏢 Internal Only: HIGH - Even internally, the HTTP management interface is usually accessible and vulnerable.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly disclosed. The vulnerability requires no authentication and has straightforward exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider replacing affected devices or implementing workarounds.

🔧 Temporary Workarounds

Disable HTTP management interface

all

Disable the web management interface or restrict access to trusted IPs only

Access router admin panel → System Tools → Remote Management → Disable or restrict IP range

Change default management port

all

Change HTTP management port from default 80 to non-standard port

Access router admin panel → System Tools → Remote Management → Change HTTP port

🧯 If You Can't Patch

  • Isolate affected routers in separate network segment with strict firewall rules
  • Implement network monitoring for exploitation attempts and device crashes

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin panel: Login → System Status → Firmware Version

Check Version:

Check web interface at http://router-ip or use router admin panel

Verify Fix Applied:

No fix available to verify. Monitor for device stability and absence of crashes.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/wifiSSIDset with abnormal parameters
  • Device crash/reboot logs
  • Unusual process creation

Network Indicators:

  • HTTP POST requests to /goform/wifiSSIDset with long index parameter
  • Sudden loss of router connectivity

SIEM Query:

http.url:"/goform/wifiSSIDset" AND http.method:POST AND (http.request.body:*index=* OR http.request.body.length>100)

🔗 References

📤 Share & Export