CVE-2024-32293

8.0 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda W30E routers via the page parameter in the fromDhcpListClient function. Attackers can exploit this to execute arbitrary code or crash the device. Users running affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda W30E
Versions: v1.0 V1.0.1.25(633)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device compromise, network takeover, and lateral movement to connected devices.

🟠

Likely Case

Router crash causing denial of service, potentially requiring physical reset and disrupting network connectivity.

🟢

If Mitigated

Limited impact if isolated from untrusted networks, with only denial of service possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available; exploitation requires network access to the router's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Tenda's official website or support for firmware updates; if unavailable, consider workarounds or replacement.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's web interface.

Access router settings via web interface, navigate to Advanced > System Tools > Remote Management, disable it.

Network segmentation

all

Isolate the router from untrusted networks.

Use firewall rules to restrict access to router IP on ports 80/443 to trusted IPs only.

🧯 If You Can't Patch

  • Replace the router with a model that receives security updates.
  • Monitor network traffic for unusual access attempts to the router's web interface.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or similar; if version is v1.0.1.25(633), it is vulnerable.

Check Version:

curl -s http://router-ip/ | grep -i firmware or check web interface manually.

Verify Fix Applied:

Update firmware if available and confirm version has changed from v1.0.1.25(633).

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /goform/DhcpListClient with malformed page parameter
  • Router crash logs or reboots

Network Indicators:

  • Spike in traffic to router IP on port 80/443
  • Requests with long strings in page parameter

SIEM Query:

source="router_logs" AND (url="/goform/DhcpListClient" AND page_parameter LENGTH > 100)

🔗 References

📤 Share & Export