CVE-2024-48459

7.3 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Tenda AX2 Pro routers that allows remote attackers to execute arbitrary commands with root privileges. Attackers can exploit this to gain full control of affected routers, potentially compromising home networks. Users with Tenda AX2 Pro routers running specific vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Tenda AX2 Pro home router
Versions: v.DI_7003G-19.12.24A1V16.03.29.50; V16.03.29.50; V16.03.29.50
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Router must have web interface accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to intercept all network traffic, install persistent malware, pivot to other devices on the network, and use the router as part of a botnet.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and network segmentation isolates critical devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub gist. Exploitation requires sending crafted HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support website for firmware updates
2. Download latest firmware for AX2 Pro
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Restrict admin interface access

all

Limit which IP addresses can access router admin

🧯 If You Can't Patch

  • Replace router with different model/brand
  • Place router behind dedicated firewall with strict ingress filtering

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is no longer listed in affected versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/setDebugCfg
  • Commands with shell metacharacters in web logs
  • Multiple failed login attempts followed by successful command execution

Network Indicators:

  • HTTP requests containing pipe characters or semicolons in parameters
  • Unexpected outbound connections from router
  • DNS queries to suspicious domains

SIEM Query:

source="router.log" AND ("setDebugCfg" OR "|sh" OR ";sh")

🔗 References

📤 Share & Export