CVE-2024-46628

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda G3 routers by exploiting improper input sanitization in the USB partition unmount function. Attackers can gain full control of affected routers without authentication. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Tenda G3 Router
Versions: v15.03.05.05
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in web management interface; USB functionality must be accessible but may be enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to intercept all network traffic, install persistent malware, pivot to internal networks, and disable security functions.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of cryptocurrency miners or botnet malware.

🟢

If Mitigated

Limited impact if router is behind firewall with strict inbound rules, though internal attacks remain possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains exploit details; simple HTTP request with crafted parameter can trigger RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for G3 model
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Block USB management interface

linux

Use firewall rules to block access to USB-related endpoints

iptables -A INPUT -p tcp --dport 80 -m string --string "usbPartitionName" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Implement network segmentation to limit router access to management network only

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or System Tools

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is no longer v15.03.05.05

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing usbPartitionName parameter with shell metacharacters
  • Unusual process execution from web server context

Network Indicators:

  • HTTP POST requests to /goform/setUSBPartitionUmount with suspicious payloads
  • Outbound connections from router to unknown IPs

SIEM Query:

source="router_logs" AND "usbPartitionName" AND ("|" OR ";" OR "`" OR "$")

🔗 References

📤 Share & Export