CVE-2024-42968
📋 TL;DR
This vulnerability in Tenda FH1206 routers allows attackers to trigger a stack overflow via the Go parameter in the fromSafeUrlFilter function through crafted POST requests. This can cause Denial of Service (DoS) by crashing the device. Only users of Tenda FH1206 routers with vulnerable firmware are affected.
💻 Affected Systems
- Tenda FH1206
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical reset, potentially leading to extended network downtime and service disruption.
Likely Case
Router becomes unresponsive, requiring reboot to restore functionality, causing temporary network outage.
If Mitigated
Minimal impact if device is behind firewall with restricted web interface access and proper network segmentation.
🎯 Exploit Status
Public proof-of-concept available on GitHub. Exploitation requires sending crafted POST request to vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates. 2. If update available, download and upload via web interface. 3. Reboot router after update.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to web management interface
Access router web interface > System Tools > Remote Management > Disable
Restrict Web Interface Access
allLimit access to management interface to trusted IPs only
Access router web interface > Security > Access Control > Add trusted IP ranges
🧯 If You Can't Patch
- Replace vulnerable router with updated model or different vendor
- Place router behind firewall with strict inbound rules blocking web interface ports
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Status or System Tools > Firmware Upgrade
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Verify firmware version is newer than v02.03.01.35
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /goform/safeUrlFilter with malformed Go parameter
- Router crash/reboot events in system logs
Network Indicators:
- Unusual POST requests to router management interface
- Sudden loss of connectivity to router
SIEM Query:
source="router_logs" AND (url_path="/goform/safeUrlFilter" AND method="POST" AND parameter="Go" AND size>1000)