CVE-2024-57579

9.8 CRITICAL

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote code execution. Attackers can exploit the limitSpeedUp parameter in the formSetClientState function to execute arbitrary code with root privileges. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: V15.03.05.19
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface and is accessible via HTTP requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing persistent backdoor installation, network traffic interception, lateral movement to connected devices, and bricking of the device.

🟠

Likely Case

Remote code execution leading to router compromise, credential theft, DNS hijacking, and botnet recruitment.

🟢

If Mitigated

Limited impact if the router is not internet-facing and has strict network segmentation, though local network attacks remain possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains proof-of-concept code demonstrating exploitation. The vulnerability requires no authentication and has a simple exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Tenda's official website for firmware updates. If available, download the latest firmware, log into the router's admin interface, navigate to System Tools > Firmware Upgrade, upload the new firmware file, and follow the upgrade process.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the router's web interface

Network Segmentation

all

Isolate the router on a separate VLAN to limit lateral movement

🧯 If You Can't Patch

  • Replace the router with a different model that receives security updates
  • Implement strict firewall rules to block all inbound traffic to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the router's web interface under System Status or System Tools. If the version is V15.03.05.19, the device is vulnerable.

Check Version:

Connect to the router's web interface and navigate to System Status page, or use curl: curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After updating firmware, verify the version number has changed from V15.03.05.19 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/setClientState with large limitSpeedUp parameter values
  • Multiple failed exploitation attempts showing buffer overflow patterns

Network Indicators:

  • Unusual outbound connections from the router to unknown IP addresses
  • DNS queries to suspicious domains from the router itself

SIEM Query:

source="router_logs" AND (uri_path="/goform/setClientState" AND http_method="POST" AND content_length>1000)

🔗 References

📤 Share & Export