CVE-2024-52714

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code by sending specially crafted requests to the 'fromSetSysTime' function. This affects Tenda AC6 v2.0 routers running firmware version 15.03.06.50. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • Tenda AC6 v2.0
Versions: v15.03.06.50
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific hardware version and firmware version combination. Other Tenda models or different firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full router compromise, credential theft, network traffic interception, and lateral movement into connected networks.

🟠

Likely Case

Router takeover allowing attackers to modify DNS settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if the router is behind a firewall with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this vulnerability can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists on GitHub. The vulnerability requires no authentication and has a simple exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://tenda.com

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC6 v2.0. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external attackers from accessing the vulnerable interface

Network Segmentation

all

Isolate the router from critical internal networks

🧯 If You Can't Patch

  • Replace the vulnerable router with a different model or vendor
  • Implement strict firewall rules to block all inbound traffic to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

Login to router web interface and check System Status page

Verify Fix Applied:

Verify firmware version has been updated to a version later than v15.03.06.50

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /goform/SetSysTime or similar time-setting endpoints
  • Multiple failed login attempts followed by buffer overflow patterns

Network Indicators:

  • Unusual outbound connections from router to unknown IPs
  • DNS hijacking patterns
  • Traffic redirection

SIEM Query:

source="router_logs" AND (uri="/goform/SetSysTime" OR uri="/goform/setSysTime") AND status=200

🔗 References

📤 Share & Export