CVE-2024-30587

9.8 CRITICAL

📋 TL;DR

CVE-2024-30587 is a critical stack overflow vulnerability in Tenda FH1202 routers that allows remote code execution. Attackers can exploit the 'urls' parameter in the saveParentControlInfo function to crash the device or execute arbitrary code. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda FH1202
Versions: v1.2.0.14(408)
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface's parent control feature. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent backdoor installation, network traffic interception, and lateral movement to other devices on the network.

🟠

Likely Case

Remote code execution leading to device takeover, enabling attackers to modify router settings, intercept traffic, or use the device as a botnet node.

🟢

If Mitigated

Denial of service through device crash if exploit fails to achieve code execution, requiring physical reset.

🌐 Internet-Facing: HIGH - The vulnerable function is accessible via web interface, making internet-exposed devices immediately vulnerable to remote attacks.
🏢 Internal Only: MEDIUM - Devices behind firewalls are still vulnerable to internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available in GitHub repositories. The vulnerability requires no authentication and has straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. If update available, download and install via web interface. 3. Reboot router after installation. 4. Verify firmware version is no longer v1.2.0.14(408).

🔧 Temporary Workarounds

Disable web management interface

all

Prevent access to the vulnerable function by disabling the router's web interface

Access router settings via SSH/Telnet if available and disable web interface

Network segmentation

all

Isolate vulnerable routers from critical network segments

Configure firewall rules to restrict access to router management interface

🧯 If You Can't Patch

  • Replace vulnerable devices with patched or different model routers
  • Implement strict network access controls to limit exposure of router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at 192.168.0.1 or 192.168.1.1, login and navigate to System Status

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is no longer v1.2.0.14(408) and test if saveParentControlInfo function still accepts malformed urls parameter

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/saveParentControlInfo with long urls parameter
  • Router crash/reboot logs
  • Multiple failed login attempts followed by exploitation attempts

Network Indicators:

  • HTTP requests with unusually long parameters to router management interface
  • Traffic patterns suggesting router compromise (unexpected outbound connections)

SIEM Query:

source="router_logs" AND (uri_path="/goform/saveParentControlInfo" AND parameter_length>1000) OR (event_type="crash" AND device_model="FH1202")

🔗 References

📤 Share & Export