CVE-2024-41463

7.5 HIGH

📋 TL;DR

CVE-2024-41463 is a stack-based buffer overflow vulnerability in Tenda FH1201 routers that allows remote attackers to execute arbitrary code or cause denial of service by sending specially crafted requests to the entrys parameter. This affects all users running vulnerable firmware versions of the Tenda FH1201 router.

💻 Affected Systems

Products:
  • Tenda FH1201
Versions: v1.2.0.14 and likely earlier versions
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the vulnerable endpoint is part of the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistence, and lateral movement to connected networks.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset to restore functionality.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted access to management interface.

🌐 Internet-Facing: HIGH - Router management interfaces are often exposed to WAN by default.
🏢 Internal Only: MEDIUM - Attackers on local network can exploit without internet access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository. Exploitation requires sending HTTP POST request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin panel. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload new firmware file. 6. Wait for automatic reboot.

🔧 Temporary Workarounds

Disable WAN Management Access

all

Prevent external access to router management interface

Access router admin panel > Advanced > System Tools > Remote Management > Disable

Network Segmentation

all

Isolate router management interface to trusted network segment

Configure firewall rules to restrict access to port 80/443 to trusted IPs only

🧯 If You Can't Patch

  • Replace vulnerable device with supported model
  • Deploy network firewall with deep packet inspection to block exploit patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin panel under System Status or System Tools > Firmware Upgrade

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than v1.2.0.14 and test if /ip/goform/addressNat endpoint still accepts malformed entrys parameter

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /ip/goform/addressNat with large entrys parameter
  • Router crash/reboot logs

Network Indicators:

  • HTTP POST requests to /ip/goform/addressNat with unusually long parameters
  • Traffic patterns matching known exploit code

SIEM Query:

source="router_logs" AND (url="/ip/goform/addressNat" AND parameter_size>1000)

🔗 References

📤 Share & Export