CVE-2024-2855

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers to execute arbitrary code by manipulating the 'time' parameter in the fromSetSysTime function. This affects Tenda AC15 routers running firmware versions 15.03.05.18, 15.03.05.19, and 15.03.20. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC15
Versions: 15.03.05.18, 15.03.05.19, 15.03.20
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. The web management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, creation of persistent backdoors, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Device takeover enabling traffic interception, DNS hijacking, credential theft, and use as attack platform against internal networks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Directly exposed routers can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit if they reach the management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists in GitHub repositories. The vulnerability requires no authentication and has straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider replacing affected devices or implementing workarounds.

🔧 Temporary Workarounds

Disable Remote Management

all

Disable web management interface access from WAN/Internet

Access router admin panel > Advanced > System Tools > Remote Management > Disable

Restrict Management Access

all

Limit management interface access to specific trusted IP addresses only

Access router admin panel > Advanced > Security > Access Control > Add trusted IP ranges

🧯 If You Can't Patch

  • Segment affected routers on isolated network VLANs
  • Implement strict firewall rules blocking all inbound traffic to router management ports (typically 80, 443, 8080)

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface: Login > Advanced > System Status > Firmware Version

Check Version:

curl -s http://router-ip/goform/getStatus | grep version (if API accessible)

Verify Fix Applied:

Verify firmware version is NOT 15.03.05.18, 15.03.05.19, or 15.03.20. No official patch exists.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SetSysTimeCfg
  • Multiple failed buffer overflow attempts in system logs
  • Unexpected process crashes or reboots

Network Indicators:

  • Unusual outbound connections from router to unknown IPs
  • Traffic spikes to router management interface
  • DNS queries to suspicious domains from router

SIEM Query:

source="router_logs" AND (uri="/goform/SetSysTimeCfg" OR message="buffer overflow" OR message="segmentation fault")

🔗 References

📤 Share & Export