CVE-2024-46652

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8v4 routers via a stack overflow in the fromAdvSetMacMtuWan function. Attackers can gain full control of affected devices without authentication. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Tenda AC8v4
Versions: V16.03.34.06
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but external exploitation is more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed analysis and likely exploit code. CVSS 9.8 indicates trivial exploitation with high impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. If update available, download and flash via web interface
3. Factory reset after update to ensure clean state
4. Verify new firmware version is installed

🔧 Temporary Workarounds

Disable WAN Management

all

Prevent external access to router management interface

Login to router admin panel → Advanced Settings → Remote Management → Disable

Network Segmentation

all

Place router in isolated network segment with strict firewall rules

🧯 If You Can't Patch

  • Replace affected routers with different models or brands
  • Implement strict network monitoring and intrusion detection for router traffic

🔍 How to Verify

Check if Vulnerable:

Access router web interface at 192.168.0.1 or 192.168.1.1, navigate to System Status or About page, check firmware version.

Check Version:

curl -s http://192.168.0.1/goform/getStatus | grep version (adjust IP as needed)

Verify Fix Applied:

Verify firmware version is different from V16.03.34.06 and no longer matches vulnerable version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to fromAdvSetMacMtuWan endpoint
  • Large payloads in HTTP requests to router management interface
  • Router reboot events without user action

Network Indicators:

  • Unusual outbound connections from router to unknown IPs
  • Traffic spikes from router WAN interface
  • DNS queries to suspicious domains from router

SIEM Query:

source="router_logs" AND (uri="*fromAdvSetMacMtuWan*" OR method="POST" AND bytes>10000)

🔗 References

📤 Share & Export