CVE-2024-30583

8.0 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda FH1202 routers that allows remote code execution. Attackers can exploit the mitInterface parameter in the fromAddressNat function to crash the device or execute arbitrary code. This affects users running vulnerable firmware versions of the Tenda FH1202 router.

💻 Affected Systems

Products:
  • Tenda FH1202
Versions: v1.2.0.14(408)
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface which is typically enabled by default on port 80/443.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent remote access, network traffic interception, and lateral movement to connected devices.

🟠

Likely Case

Router crash requiring physical reset, temporary denial of service, and potential credential theft from router configuration.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and regular patching schedule.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept exploit code. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. Download latest firmware for FH1202
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and apply new firmware
6. Wait for automatic reboot

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Access router admin panel > Advanced > System Tools > Remote Management > Disable

Restrict Management Interface

all

Limit admin access to specific IP addresses

Access router admin panel > Advanced > Security > Access Control > Add allowed IPs

🧯 If You Can't Patch

  • Replace vulnerable device with supported model
  • Place router behind firewall with strict inbound rules blocking ports 80, 443, 8080

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status > Firmware Version

Check Version:

curl -s http://router-ip/status.cgi | grep version

Verify Fix Applied:

Verify firmware version is newer than v1.2.0.14(408) after update

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/fromAddressNat with long mitInterface parameter
  • Router crash/reboot events in system logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP requests with oversized mitInterface parameter (>1000 chars)
  • Traffic to router on port 80/443 from unexpected sources
  • Router becoming unresponsive to ping

SIEM Query:

source="router_logs" AND (uri_path="/goform/fromAddressNat" AND content_length>1000)

🔗 References

📤 Share & Export