CVE-2024-30591

8.8 HIGH

📋 TL;DR

CVE-2024-30591 is a stack overflow vulnerability in Tenda FH1202 routers that allows remote code execution via the time parameter in the saveParentControlInfo function. Attackers can exploit this to take control of affected routers. Users of Tenda FH1202 routers with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Tenda FH1202
Versions: v1.2.0.14(408)
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface accessible via LAN/WAN. Parental control feature must be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with persistent backdoor installation, credential theft, and pivot to internal network devices.

🟠

Likely Case

Router takeover leading to DNS hijacking, traffic interception, and denial of service.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and updated firmware.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to router web interface. Proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Log into router admin panel. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent WAN access to router web interface

Restrict LAN access

all

Use firewall rules to limit which devices can access router admin interface

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict access controls
  • Implement network segmentation to limit router compromise impact

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status > Firmware Version

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than v1.2.0.14(408)

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/saveParentControlInfo with long time parameter
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND (uri_path="/goform/saveParentControlInfo" AND param_length>100) OR (event="authentication" AND result="success" AFTER result="failure")

🔗 References

📤 Share & Export