CVE-2024-42634

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary operating system commands with root privileges on Tenda AC9 routers. Attackers can exploit the command injection flaw in the httpd binary's formWriteFacMac function to gain complete control of affected devices. All users running vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda AC9
Versions: v15.03.06.42
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the httpd service that runs on the router.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and use the device as part of botnets or for cryptomining.

🟠

Likely Case

Attackers gain root access to the router, enabling them to modify DNS settings, intercept credentials, deploy malware to connected devices, and use the router for malicious activities.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact could be limited to the router itself without allowing lateral movement to other systems.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers from the internet.
🏢 Internal Only: MEDIUM - While primarily internet-facing, compromised routers could be used to attack internal networks if not properly segmented.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains technical details and proof-of-concept information that could be weaponized. The vulnerability requires no authentication and has low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. If available, download the latest firmware for AC9. 3. Log into router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Turn off remote management/administration features to prevent external exploitation

Network Segmentation

all

Place the router in a separate network segment with strict firewall rules

🧯 If You Can't Patch

  • Replace the vulnerable router with a different model that receives security updates
  • Implement strict network monitoring and intrusion detection for the router's network segment

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is v15.03.06.42, the device is vulnerable.

Check Version:

Log into router admin interface and navigate to System Status or About page to view firmware version.

Verify Fix Applied:

After updating firmware, verify the version is no longer v15.03.06.42 and check that the formWriteFacMac endpoint no longer accepts malicious input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to formWriteFacMac endpoint
  • Suspicious command execution in router logs
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from router
  • DNS hijacking or redirection
  • Unexpected SSH or telnet connections to router

SIEM Query:

source="router_logs" AND (uri="*formWriteFacMac*" OR command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export