CVE-2024-35339
📋 TL;DR
This CVE describes a command injection vulnerability in Tenda FH1206 routers that allows remote attackers to execute arbitrary commands on the device. Attackers can exploit this by sending specially crafted requests to the vulnerable endpoint, potentially gaining full control of the router. This affects users running the vulnerable firmware version on Tenda FH1206 routers.
💻 Affected Systems
- Tenda FH1206
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use the device for botnet activities.
Likely Case
Attackers gain shell access to the router, modify network settings, intercept credentials, and potentially compromise connected devices.
If Mitigated
With proper network segmentation and firewall rules, impact is limited to the router itself without lateral movement to other systems.
🎯 Exploit Status
The vulnerability requires no authentication and has a simple exploitation path via HTTP POST requests. Public proof-of-concept demonstrates command execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates. 2. Download latest firmware for FH1206. 3. Access router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.
🔧 Temporary Workarounds
Block Vulnerable Endpoint
linuxUse router firewall or external firewall to block access to the vulnerable endpoint
iptables -A INPUT -p tcp --dport 80 -m string --string "ip/goform/WriteFacMac" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "ip/goform/WriteFacMac" --algo bm -j DROP
Disable Remote Management
allTurn off remote management access to the router's web interface
🧯 If You Can't Patch
- Isolate the router on a dedicated VLAN with strict firewall rules
- Implement network monitoring for suspicious requests to the vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under System Status or System Tools. If version is V1.2.0.8(8155), the device is vulnerable.
Check Version:
curl -s http://router-ip/ | grep -i firmware || ssh admin@router-ip 'cat /etc/version'
Verify Fix Applied:
After updating firmware, verify version has changed from V1.2.0.8(8155) to a newer version. Test the endpoint with safe payloads to confirm command injection is no longer possible.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /ip/goform/WriteFacMac with unusual mac parameter values
- System logs showing unexpected command execution or process creation
Network Indicators:
- HTTP traffic containing shell metacharacters in POST parameters
- Outbound connections from router to suspicious IPs
SIEM Query:
source="router-logs" AND (url="/ip/goform/WriteFacMac" AND (method="POST") AND (param="mac" CONTAINS "|" OR param="mac" CONTAINS ";" OR param="mac" CONTAINS "`"))