CVE-2024-11650

6.5 MEDIUM

📋 TL;DR

A critical null pointer dereference vulnerability in Tenda i9 routers allows remote attackers to crash the device or potentially execute arbitrary code by sending specially crafted requests to the /goform/GetIPTV endpoint. This affects Tenda i9 router firmware version 1.0.0.8(3828). Attackers can exploit this without authentication from the network.

💻 Affected Systems

Products:
  • Tenda i9 router
Versions: 1.0.0.8(3828)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, router configuration modification, credential theft, and lateral movement into internal networks.

🟠

Likely Case

Denial of service causing router crash and network disruption, requiring physical reset to restore functionality.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access, though internal attackers could still exploit.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network user.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on GitHub, making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Wait for router to reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Tenda i9 routers from untrusted networks and restrict access to management interfaces.

Access Control Lists

linux

Implement firewall rules to block external access to port 80/443 and internal access to /goform/ endpoints.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Replace vulnerable Tenda i9 routers with supported, patched alternatives from different vendors.
  • Implement strict network monitoring and anomaly detection for traffic to router management interfaces.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly 1.0.0.8(3828), device is vulnerable.

Check Version:

Check via router web interface at http://router_ip or use nmap scan for banner grabbing.

Verify Fix Applied:

Verify firmware version has changed from 1.0.0.8(3828) to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • Repeated requests to /goform/GetIPTV endpoint
  • Router crash/reboot events
  • Unusual outbound connections from router

Network Indicators:

  • HTTP POST requests to /goform/GetIPTV with malformed parameters
  • Sudden loss of connectivity to router

SIEM Query:

source="router_logs" AND (uri="/goform/GetIPTV" OR event="crash" OR event="reboot")

🔗 References

📤 Share & Export