CVE-2024-10280

6.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Tenda routers allows remote attackers to cause denial of service by manipulating the Content-Length argument in the websReadEvent function. This affects multiple Tenda AC series router models up to October 22, 2024. Attackers can exploit this remotely without authentication to crash the router's web service.

💻 Affected Systems

Products:
  • Tenda AC6
  • Tenda AC7
  • Tenda AC8
  • Tenda AC9
  • Tenda AC10
  • Tenda AC10U
  • Tenda AC15
  • Tenda AC18
  • Tenda AC500
  • Tenda AC1206
Versions: All versions up to 20241022
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models with firmware versions up to October 22, 2024 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Router becomes completely unresponsive requiring physical reboot, potentially disrupting all network connectivity for connected devices.

🟠

Likely Case

Web management interface becomes unavailable, requiring router reboot to restore functionality.

🟢

If Mitigated

Minimal impact if routers are behind firewalls with restricted WAN access to management interfaces.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication, and routers are typically internet-facing devices.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware for your model. 3. Access router web interface. 4. Navigate to firmware upgrade section. 5. Upload and install new firmware. 6. Reboot router after installation.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Restrict Management Interface Access

all

Limit access to router web interface to trusted IP addresses only

🧯 If You Can't Patch

  • Place routers behind firewalls with strict inbound rules blocking access to port 80/443
  • Implement network segmentation to isolate routers from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or About page. If version date is 20241022 or earlier, router is vulnerable.

Check Version:

No CLI command available. Must check via web interface at http://router-ip/ or router admin panel.

Verify Fix Applied:

After firmware update, verify version shows date later than 20241022 and test web interface functionality remains stable.

📡 Detection & Monitoring

Log Indicators:

  • Multiple connection attempts to /goform/GetIPTV
  • Web service crash logs
  • Router reboot events without user action

Network Indicators:

  • HTTP requests with manipulated Content-Length headers to router IP
  • Sudden loss of connectivity to router management interface

SIEM Query:

source="router_logs" AND (uri="/goform/GetIPTV" OR event="web_service_crash")

🔗 References

📤 Share & Export