CVE-2024-42982

7.5 HIGH

📋 TL;DR

This vulnerability in Tenda FH1206 routers allows attackers to cause a Denial of Service (DoS) by sending a specially crafted POST request that triggers a stack overflow. The vulnerability affects Tenda FH1206 routers running firmware version v02.03.01.35. Attackers can exploit this remotely without authentication to crash the device.

💻 Affected Systems

Products:
  • Tenda FH1206
Versions: v02.03.01.35
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may or may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, potential for remote code execution if the overflow can be controlled precisely (though not confirmed in this CVE).

🟠

Likely Case

Router becomes unresponsive, requiring manual reboot to restore functionality, disrupting network connectivity for all connected devices.

🟢

If Mitigated

If the router is behind a firewall with strict inbound filtering, exploitation attempts are blocked, preventing DoS.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP POST requests, making internet-facing routers particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers on the network can still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference provides technical details that could be used to create an exploit. The vulnerability requires sending a crafted POST request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

Check Tenda's official website or support portal for firmware updates. If an update is available, download and install it via the router's web interface, then reboot the device.

🔧 Temporary Workarounds

Block HTTP access to router

all

Prevent external access to the router's web interface by configuring firewall rules to block inbound HTTP/HTTPS traffic to the router's IP.

Change default admin password

all

While this doesn't fix the vulnerability, it reduces the risk of other attacks and is a good security practice.

🧯 If You Can't Patch

  • Isolate the router on a separate network segment to limit blast radius if exploited.
  • Monitor network traffic for unusual POST requests to the router's IP address.

🔍 How to Verify

Check if Vulnerable:

Check the router's firmware version via the web interface (typically under System Status or Advanced Settings). If it shows v02.03.01.35, it is vulnerable.

Check Version:

Not applicable via command line; use router web interface at http://[router-ip] and navigate to firmware/version section.

Verify Fix Applied:

After updating firmware, verify the version has changed from v02.03.01.35 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Router logs showing crashes or reboots
  • Web server logs with malformed POST requests to /goform/fromVirtualSer or similar endpoints

Network Indicators:

  • Unusual HTTP POST requests to router IP on port 80/443 with large or malformed 'page' parameter

SIEM Query:

source="router_logs" AND (event="crash" OR event="reboot") OR http.method="POST" AND http.uri="/goform/fromVirtualSer" AND http.param.page="*"

🔗 References

📤 Share & Export