CVE-2024-33211
📋 TL;DR
CVE-2024-33211 is a stack-based buffer overflow vulnerability in Tenda FH1206 routers that allows remote attackers to execute arbitrary code by sending specially crafted requests to the PPPOEPassword parameter. This affects Tenda FH1206 V1.2.0.8(8155)_EN firmware users who have the vulnerable web interface exposed. Attackers can potentially gain full control of affected routers.
💻 Affected Systems
- Tenda FH1206
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement into internal networks.
Likely Case
Router compromise allowing attackers to change DNS settings, intercept traffic, or use the router as a pivot point for further attacks.
If Mitigated
Limited impact if the router's web interface is not exposed to the internet and proper network segmentation is in place.
🎯 Exploit Status
The vulnerability requires no authentication and has a public proof-of-concept available, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Check Tenda's official website for firmware updates. If an update is available, download and install it through the router's web interface.
🔧 Temporary Workarounds
Disable WAN access to web interface
allPrevent external access to the router's management interface
Change default credentials
allUse strong, unique passwords for router administration
🧯 If You Can't Patch
- Replace affected routers with models from vendors that provide security updates
- Place routers behind firewalls with strict inbound rules blocking all unnecessary ports
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface. If version is V1.2.0.8(8155)_EN, the device is vulnerable.
Check Version:
Not applicable - check via router web interface
Verify Fix Applied:
Verify firmware version has been updated to a version later than V1.2.0.8(8155)_EN
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /ip/goform/QuickIndex with long PPPOEPassword parameters
- Multiple failed login attempts followed by exploitation attempts
Network Indicators:
- Unusual outbound connections from router to unknown IPs
- DNS changes or unexpected proxy configurations
SIEM Query:
source="router_logs" AND uri="/ip/goform/QuickIndex" AND (POST OR parameters CONTAINS "PPPOEPassword")