CVE-2024-41459

9.8 CRITICAL

📋 TL;DR

CVE-2024-41459 is a critical stack-based buffer overflow vulnerability in Tenda FH1201 routers that allows remote attackers to execute arbitrary code by sending specially crafted requests to the PPPOEPassword parameter. This affects all users running Tenda FH1201 v1.2.0.14 firmware who have the vulnerable web interface accessible.

💻 Affected Systems

Products:
  • Tenda FH1201
Versions: v1.2.0.14
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface at ip/goform/QuickIndex. The vulnerability is in the PPPOEPassword parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to connected devices, and potential botnet recruitment.

🟠

Likely Case

Remote code execution allowing attacker to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if the web interface is not internet-facing and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via the web interface which is often exposed to the internet on consumer routers.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks, but requires attacker to have network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository. Exploitation requires sending a crafted HTTP POST request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware for FH1201. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to trusted network

🧯 If You Can't Patch

  • Replace affected router with different model or vendor
  • Implement strict firewall rules to block access to router web interface from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface (System Status > Firmware Version) or by accessing http://[router-ip]/goform/getStatus

Check Version:

curl -s http://[router-ip]/goform/getStatus | grep -i version

Verify Fix Applied:

Verify firmware version is no longer v1.2.0.14 and test if the vulnerable endpoint still accepts malformed PPPOEPassword input

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/QuickIndex with long PPPOEPassword parameters
  • Multiple failed authentication attempts followed by successful exploit

Network Indicators:

  • HTTP POST requests to router IP on port 80/443 with unusually long parameter values
  • Sudden outbound connections from router to unknown IPs

SIEM Query:

source="router_logs" AND uri="/goform/QuickIndex" AND (param_length>100 OR status_code=500)

🔗 References

📤 Share & Export