CVE-2024-33182

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical stack-based buffer overflow vulnerability in Tenda AC18 routers. Attackers can exploit this by sending specially crafted requests to the addWifiMacFilter endpoint, potentially allowing remote code execution. All users running the affected firmware version are vulnerable.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: V15.03.3.10_EN
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface and is accessible via the network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the router, enabling network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Remote code execution leading to router compromise, allowing attackers to modify network settings, intercept traffic, or use the device as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact could be limited to the router itself without allowing access to internal systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web endpoint and requires no authentication, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates
2. Download the latest firmware for AC18
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install the new firmware
6. Reboot the router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's web interface

Block access to vulnerable endpoint

all

Use firewall rules to block access to /ip/goform/addWifiMacFilter

🧯 If You Can't Patch

  • Isolate the router in a separate network segment
  • Implement strict firewall rules to limit access to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

Check via web interface or SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V15.03.3.10_EN

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /ip/goform/addWifiMacFilter with long deviceId parameters
  • Router crash or reboot logs

Network Indicators:

  • Unusual traffic patterns to router management interface
  • Exploit payloads in HTTP requests

SIEM Query:

http.url:"/ip/goform/addWifiMacFilter" AND http.method:POST AND http.request_body_length > 1000

🔗 References

📤 Share & Export