CVE-2024-4166
📋 TL;DR
This critical vulnerability in Tenda 4G300 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the sub_41E858 function when manipulating the GO/page argument. Attackers can exploit this without authentication to potentially take full control of affected devices. All users of Tenda 4G300 routers running vulnerable firmware versions are affected.
💻 Affected Systems
- Tenda 4G300
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to internal networks, and botnet recruitment.
Likely Case
Remote code execution allowing attackers to modify device configuration, intercept traffic, or use the device as a pivot point into internal networks.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.
🎯 Exploit Status
Public proof-of-concept exists on GitHub, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: Yes
Instructions:
No official patch available. Contact Tenda support for firmware updates and monitor their security advisories.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected routers in separate network segments to limit potential lateral movement.
Firewall Restrictions
allBlock all inbound traffic to the router's management interface from untrusted networks.
🧯 If You Can't Patch
- Replace affected devices with alternative models from different vendors
- Implement strict network monitoring and anomaly detection for traffic to/from affected devices
🔍 How to Verify
Check if Vulnerable:
Check firmware version via router web interface at System Status > Firmware Version or via SSH/Telnet if enabled.
Check Version:
Check web interface or use: telnet [router_ip] and check firmware version in status output
Verify Fix Applied:
Verify firmware version has been updated to a version later than 1.01.42 (when available).
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to GO/page endpoints
- Multiple failed buffer overflow attempts
- Sudden configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic spikes to suspicious IPs
- Port scanning originating from router
SIEM Query:
source_ip=[router_ip] AND (uri_path="*GO/page*" OR uri_path="*sub_41E858*")
🔗 References
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md
- https://vuldb.com/?ctiid.261985
- https://vuldb.com/?id.261985
- https://vuldb.com/?submit.318981
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md
- https://vuldb.com/?ctiid.261985
- https://vuldb.com/?id.261985
- https://vuldb.com/?submit.318981