CVE-2024-42978

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Tenda FH1206 routers via a crafted HTTP request to the /goform/telnet endpoint. Attackers can gain full control of affected devices without authentication. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Tenda FH1206
Versions: v02.03.01.35
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable endpoint appears to be enabled by default in the affected firmware version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, pivot to internal networks, intercept all network traffic, or brick the device.

🟠

Likely Case

Attackers gain shell access to execute commands, potentially installing backdoors, modifying configurations, or launching attacks against internal network devices.

🟢

If Mitigated

If network segmentation and access controls are properly implemented, impact may be limited to the router itself rather than the entire network.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via HTTP requests, making internet-exposed devices immediately vulnerable to remote exploitation.
🏢 Internal Only: HIGH - Even internally, any attacker on the network can exploit this vulnerability to gain router control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains technical details that could be used to create working exploits. No authentication is required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Tenda's official website for firmware updates. If available, download the latest firmware and apply it through the router's web interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Disable remote management

all

Disable remote management features to prevent external access to the vulnerable endpoint

Network segmentation

all

Isolate the router on a separate VLAN to limit potential lateral movement

🧯 If You Can't Patch

  • Replace the device with a different model or vendor that provides security updates
  • Implement strict firewall rules to block all external access to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status. If version is v02.03.01.35, device is vulnerable.

Check Version:

Check router web interface or use: curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After updating firmware, verify version has changed from v02.03.01.35 and test if /goform/telnet endpoint still responds to crafted requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/telnet
  • Unexpected telnet service activation
  • Suspicious command execution in router logs

Network Indicators:

  • HTTP requests to router IP on port 80/443 with crafted telnet parameters
  • Unexpected outbound connections from router

SIEM Query:

source="router_logs" AND (uri="/goform/telnet" OR message="telnet")

🔗 References

📤 Share & Export