CVE-2024-28535

9.8 CRITICAL

📋 TL;DR

CVE-2024-28535 is a critical stack overflow vulnerability in Tenda AC18 routers that allows remote code execution. Attackers can exploit the mitInterface parameter in the fromAddressNat function to crash the device or execute arbitrary code. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: V15.03.05.05
Operating Systems: Embedded Linux (Tenda custom firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable regardless of configuration settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent remote access, network traffic interception, and lateral movement to other devices on the network.

🟠

Likely Case

Router crash requiring physical reset, temporary network disruption, and potential credential theft from connected devices.

🟢

If Mitigated

Denial of service affecting only the router's web interface with no network traffic impact if proper segmentation exists.

🌐 Internet-Facing: HIGH - The vulnerability is in a web interface function that's typically exposed to WAN interfaces on consumer routers.
🏢 Internal Only: MEDIUM - Exploitation requires network access but could be leveraged from compromised internal devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed analysis and proof-of-concept. The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates. 2. Download latest firmware for AC18 model. 3. Access router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Wait for automatic reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external exploitation by disabling WAN access to router administration interface

Network Segmentation

all

Isolate router management interface to separate VLAN with strict access controls

🧯 If You Can't Patch

  • Replace affected Tenda AC18 routers with different models from vendors with better security track records
  • Implement strict firewall rules blocking all external access to router management interfaces (ports 80/443)

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to System Status page and check firmware version matches V15.03.05.05

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After firmware update, verify version number no longer shows V15.03.05.05 and test if fromAddressNat function responds to overflow attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to fromAddressNat endpoint
  • Router crash/reboot logs
  • Large payloads in HTTP requests to mitInterface parameter

Network Indicators:

  • Multiple failed HTTP requests to router admin interface from external IPs
  • Unusual traffic patterns to router port 80/443

SIEM Query:

source="router.log" AND (uri="*/fromAddressNat*" OR message="*mitInterface*" OR message="*stack overflow*")

🔗 References

📤 Share & Export