CVE-2024-51116
📋 TL;DR
A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code by sending specially crafted requests to the formSetPPTPServer function. This affects Tenda AC6 v2.0 routers running firmware version V15.03.06.50. Attackers could potentially gain full control of affected devices.
💻 Affected Systems
- Tenda AC6 v2.0
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, creation of persistent backdoors, and pivoting to internal networks.
Likely Case
Router compromise allowing traffic interception, DNS manipulation, credential theft, and denial of service.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.
🎯 Exploit Status
Public GitHub repository contains proof-of-concept code. Exploitation appears straightforward based on the buffer overflow nature.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda official website for firmware updates
2. If update available, download and flash via web interface
3. Factory reset after update to ensure clean configuration
4. Verify version is no longer V15.03.06.50
🔧 Temporary Workarounds
Disable PPTP Server
allDisable the vulnerable PPTP server functionality if not required
Network Segmentation
allIsolate router management interface from untrusted networks
🧯 If You Can't Patch
- Replace affected routers with supported models from different vendors
- Implement strict firewall rules blocking all inbound traffic to router management interfaces
🔍 How to Verify
Check if Vulnerable:
Access router web interface at 192.168.0.1, navigate to System Status page and check firmware version
Check Version:
curl -s http://192.168.0.1/ | grep -i 'firmware version' or check web interface
Verify Fix Applied:
Verify firmware version has changed from V15.03.06.50 to a newer version
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to formSetPPTPServer endpoint
- Router crash/reboot logs
- Memory corruption errors in system logs
Network Indicators:
- Unusual traffic patterns to router management interface
- Large payloads sent to PPTP configuration endpoints
SIEM Query:
source="router_logs" AND ("formSetPPTPServer" OR "PPTP" OR "buffer overflow")