CVE-2024-2708
📋 TL;DR
This critical vulnerability in Tenda AC10U routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the formexeCommand function. Attackers can exploit this without authentication to potentially take full control of affected devices. Users running Tenda AC10U firmware version 15.03.06.49 are affected.
💻 Affected Systems
- Tenda AC10U
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and participation in botnets.
Likely Case
Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily weaponizable by attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates
2. If update available, download and install via router admin interface
3. Reboot router after installation
4. Verify firmware version is no longer 15.03.06.49
🔧 Temporary Workarounds
Block Access to Vulnerable Endpoint
linuxUse firewall rules to block HTTP requests to /goform/execCommand
iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/execCommand" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/goform/execCommand" --algo bm -j DROP
Disable Remote Administration
allTurn off remote management features in router settings
🧯 If You Can't Patch
- Isolate affected routers in separate VLAN with strict firewall rules
- Implement network monitoring for unusual traffic patterns from router IPs
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via admin interface at 192.168.0.1 or 192.168.1.1
Check Version:
curl -s http://router-ip/goform/getStatus | grep version
Verify Fix Applied:
Verify firmware version is no longer 15.03.06.49 and test if /goform/execCommand endpoint responds differently
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /goform/execCommand with long cmdinput parameters
- Unusual process execution from router services
Network Indicators:
- Outbound connections from router to suspicious IPs
- Unusual traffic patterns from router
SIEM Query:
source="router_logs" AND uri="/goform/execCommand" AND (cmdinput="*" OR cmdinput_length>100)
🔗 References
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md
- https://vuldb.com/?ctiid.257459
- https://vuldb.com/?id.257459
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md
- https://vuldb.com/?ctiid.257459
- https://vuldb.com/?id.257459