CVE-2024-46450

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication on Tenda AC1200 routers by sending specially crafted web requests. Attackers could gain unauthorized access to the router's administrative interface. This affects users running vulnerable firmware versions on the specified router model.

💻 Affected Systems

Products:
  • Tenda AC1200 Smart Dual-Band WiFi Router Model AC6 v2.0
Versions: Firmware v15.03.06.50
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific model and firmware version mentioned. Other Tenda models or firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the router, enabling them to intercept traffic, modify DNS settings, install malware, or pivot to internal networks.

🟠

Likely Case

Attackers access router settings to change configurations, monitor network traffic, or perform man-in-the-middle attacks.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact is limited to the router itself rather than the entire network.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting specific web requests but no authentication is needed once the vulnerability is triggered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda website for latest firmware

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to System Tools > Firmware Upgrade. 3. Download latest firmware from Tenda website. 4. Upload and install firmware. 5. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external access to router admin interface

Change Default Admin Password

all

Adds additional authentication layer

🧯 If You Can't Patch

  • Segment router on isolated network segment
  • Implement network firewall rules to restrict access to router admin interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version has been updated to a version newer than v15.03.06.50

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Admin interface access from unexpected IPs
  • Configuration changes without authorized user login

Network Indicators:

  • HTTP requests to router admin interface with unusual parameters
  • Traffic patterns suggesting router compromise

SIEM Query:

source_ip=* AND destination_ip=router_ip AND (url_contains="/goform/" OR user_agent_contains="curl" OR status_code=200 AND method=POST)

🔗 References

📤 Share & Export