CVE-2024-4115

8.8 HIGH

📋 TL;DR

This critical vulnerability in Tenda W15E routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the DNS forwarding configuration function. Attackers can exploit this without authentication to potentially take full control of affected devices. All users running the vulnerable firmware version are at risk.

💻 Affected Systems

Products:
  • Tenda W15E
Versions: 15.11.0.14
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable by default. The vulnerable function is part of the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules, though internal network exposure remains possible.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network user to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available on GitHub, making exploitation straightforward for attackers. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available. Monitor Tenda's website for firmware updates and apply immediately when released.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's web interface

Access router admin panel → Advanced Settings → Remote Management → Disable

Block access to vulnerable endpoint

linux

Use firewall rules to block access to /goform/AddDnsForward

iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/AddDnsForward" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/goform/AddDnsForward" --algo bm -j DROP

🧯 If You Can't Patch

  • Replace affected devices with non-vulnerable models from different vendors
  • Isolate vulnerable routers in separate network segments with strict firewall rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin panel: System Status → Firmware Version. If version is 15.11.0.14, device is vulnerable.

Check Version:

curl -s http://router-ip/ | grep -i firmware || Check web interface manually

Verify Fix Applied:

After applying any firmware update, verify version has changed from 15.11.0.14. Test if /goform/AddDnsForward endpoint still accepts malformed input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/AddDnsForward with long parameter values
  • Router crash/restart logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP requests with oversized DnsForwardRule parameter
  • Traffic patterns suggesting router compromise (beaconing, scanning)

SIEM Query:

source="router_logs" AND (url="/goform/AddDnsForward" AND content_length>1000) OR (event="crash" AND process="httpd")

🔗 References

📤 Share & Export