CVE-2024-30622

9.8 CRITICAL

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda FH1205 routers that allows remote code execution by sending specially crafted requests to the fromAddressNat function. Attackers can exploit this to take full control of affected routers. All users of Tenda FH1205 v2.0.0.7(775) are affected.

💻 Affected Systems

Products:
  • Tenda FH1205
Versions: v2.0.0.7(775)
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version only. Other Tenda models or different firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to other devices on the network.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and proper network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Could still be exploited by compromised internal devices or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed analysis and likely exploit code. Stack overflow vulnerabilities in embedded devices are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. If update available, download and flash firmware
3. Factory reset after update
4. Reconfigure with secure settings

🔧 Temporary Workarounds

Network Isolation

all

Place router behind firewall with strict inbound rules

Disable Remote Management

all

Turn off WAN-side administration access

🧯 If You Can't Patch

  • Replace vulnerable device with patched alternative
  • Implement strict network segmentation to isolate router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check router web interface or serial console for firmware version v2.0.0.7(775)

Check Version:

Check router web interface at 192.168.0.1 or 192.168.1.1 under System Status

Verify Fix Applied:

Verify firmware version has changed from v2.0.0.7(775) to a newer version

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic to router management interface
  • Multiple failed exploit attempts
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting C2 communication
  • Port scanning originating from router

SIEM Query:

source_ip=router_ip AND (http_method=POST AND uri_contains="fromAddressNat" OR abnormal_port_activity)

🔗 References

📤 Share & Export