CVE-2024-10697

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC6 routers by injecting malicious commands into the 'mac' parameter of the formWriteFacMac API endpoint. Attackers can take full control of affected devices without authentication. Only Tenda AC6 routers running firmware version 15.03.05.19 are affected.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: 15.03.05.19
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; no special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with ability to pivot to internal network, intercept/modify traffic, install persistent malware, or use as botnet node.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, or deployment of cryptocurrency miners.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted API access, though still vulnerable to internal threats.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available; exploitation requires simple HTTP POST request with command injection payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC6
3. Upload via router admin interface
4. Reboot router after update

🔧 Temporary Workarounds

Block API Endpoint Access

linux

Restrict access to vulnerable /goform/WriteFacMac endpoint using firewall rules

iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/WriteFacMac" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/goform/WriteFacMac" --algo bm -j DROP

Disable Remote Management

all

Turn off WAN access to router admin interface

🧯 If You Can't Patch

  • Replace affected Tenda AC6 routers with different models/brands
  • Place routers behind dedicated firewall with strict inbound filtering

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is 15.03.05.19, device is vulnerable.

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version has changed from 15.03.05.19 to newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goform/WriteFacMac with unusual mac parameter values
  • Router logs showing unexpected command execution

Network Indicators:

  • Unusual outbound connections from router IP
  • DNS queries to suspicious domains from router

SIEM Query:

source="router_logs" AND uri_path="/goform/WriteFacMac" AND (mac="*;*" OR mac="*|*" OR mac="*`*")

🔗 References

📤 Share & Export