CVE-2024-46652
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8v4 routers via a stack overflow in the fromAdvSetMacMtuWan function. Attackers can gain full control of affected devices without authentication. All users running the vulnerable firmware version are affected.
💻 Affected Systems
- Tenda AC8v4
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to internal networks, and botnet recruitment.
Likely Case
Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.
🎯 Exploit Status
Public GitHub repository contains detailed analysis and likely exploit code. CVSS 9.8 indicates trivial exploitation with high impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda official website for firmware updates
2. If update available, download and flash via web interface
3. Factory reset after update to ensure clean state
4. Verify new firmware version is installed
🔧 Temporary Workarounds
Disable WAN Management
allPrevent external access to router management interface
Login to router admin panel → Advanced Settings → Remote Management → Disable
Network Segmentation
allPlace router in isolated network segment with strict firewall rules
🧯 If You Can't Patch
- Replace affected routers with different models or brands
- Implement strict network monitoring and intrusion detection for router traffic
🔍 How to Verify
Check if Vulnerable:
Access router web interface at 192.168.0.1 or 192.168.1.1, navigate to System Status or About page, check firmware version.
Check Version:
curl -s http://192.168.0.1/goform/getStatus | grep version (adjust IP as needed)
Verify Fix Applied:
Verify firmware version is different from V16.03.34.06 and no longer matches vulnerable version.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to fromAdvSetMacMtuWan endpoint
- Large payloads in HTTP requests to router management interface
- Router reboot events without user action
Network Indicators:
- Unusual outbound connections from router to unknown IPs
- Traffic spikes from router WAN interface
- DNS queries to suspicious domains from router
SIEM Query:
source="router_logs" AND (uri="*fromAdvSetMacMtuWan*" OR method="POST" AND bytes>10000)