CVE-2026-1329

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Tenda AX1803 routers allows remote attackers to execute arbitrary code by manipulating parameters in the guest WiFi configuration function. This affects Tenda AX1803 routers running firmware version 1.0.0.1. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AX1803
Versions: 1.0.0.1
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration. The guest WiFi feature must be accessible via the web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and botnet recruitment.

🟠

Likely Case

Remote code execution resulting in device takeover, network traffic interception, DNS hijacking, and credential theft from connected devices.

🟢

If Mitigated

Denial of service if exploit fails, or limited impact if device is behind strict network segmentation and firewalls.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects internet-facing router interfaces.
🏢 Internal Only: MEDIUM - Internal exploitation possible if attacker gains network access, but requires specific targeting of router management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available in the references. The vulnerability requires sending crafted HTTP requests to the router's web interface on port 80/443.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found in provided references

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates. 2. Download latest firmware for AX1803. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Guest WiFi

all

Turn off guest WiFi functionality to remove attack surface

Access router admin interface > WiFi Settings > Guest Network > Disable

Restrict Management Access

all

Limit router management interface access to trusted IPs only

Access router admin interface > Security > Access Control > Restrict to specific IPs

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules blocking external access to management interface
  • Implement network monitoring for suspicious HTTP requests to /goform/WifiGuestSet endpoint

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.0.0.1, device is vulnerable.

Check Version:

curl -s http://router-ip/login/Auth | grep version OR check web interface System Status page

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.0.0.1 in router admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/WifiGuestSet with unusually long parameter values
  • Router crash/reboot logs
  • Failed authentication attempts to router admin

Network Indicators:

  • HTTP traffic to router IP on port 80/443 with long guestWrlPwd/guestEn/guestSsid parameters
  • Unusual outbound connections from router after exploitation

SIEM Query:

source="router_logs" AND (url="/goform/WifiGuestSet" AND (param_length>100 OR status=500))

🔗 References

📤 Share & Export