CVE-2024-10698
📋 TL;DR
This critical vulnerability in Tenda AC6 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the device name setting function. Attackers can exploit this without authentication to potentially take full control of affected routers. Users with Tenda AC6 routers running firmware version 15.03.05.19 are affected.
💻 Affected Systems
- Tenda AC6
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete router compromise, allowing attackers to intercept traffic, deploy malware, pivot to internal networks, or create persistent backdoors.
Likely Case
Router takeover enabling traffic interception, DNS hijacking, credential theft, and network reconnaissance.
If Mitigated
Limited impact if routers are behind firewalls with strict inbound filtering, though internal threats remain possible.
🎯 Exploit Status
Public exploit code exists on GitHub, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.tenda.com.cn/
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates. 2. Download latest firmware for AC6 model. 3. Access router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router management interface
Network Segmentation
allIsolate router management interface to trusted network segment
🧯 If You Can't Patch
- Replace affected routers with patched or different models
- Implement strict network access controls to limit exposure to router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via admin interface at System Status > Firmware Version
Check Version:
Check via web interface or telnet/ssh if enabled: cat /proc/version
Verify Fix Applied:
Verify firmware version is newer than 15.03.05.19 after update
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/SetOnlineDevName
- Multiple failed login attempts followed by exploitation attempts
- Router reboot events after suspicious requests
Network Indicators:
- Unusual outbound connections from router
- DNS queries to suspicious domains
- Traffic redirection patterns
SIEM Query:
source="router_logs" AND (uri="/goform/SetOnlineDevName" OR devName="*")