CVE-2026-1329
📋 TL;DR
A stack-based buffer overflow vulnerability in Tenda AX1803 routers allows remote attackers to execute arbitrary code by manipulating parameters in the guest WiFi configuration function. This affects Tenda AX1803 routers running firmware version 1.0.0.1. Attackers can exploit this without authentication to potentially take full control of affected devices.
💻 Affected Systems
- Tenda AX1803
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and botnet recruitment.
Likely Case
Remote code execution resulting in device takeover, network traffic interception, DNS hijacking, and credential theft from connected devices.
If Mitigated
Denial of service if exploit fails, or limited impact if device is behind strict network segmentation and firewalls.
🎯 Exploit Status
Public exploit details are available in the references. The vulnerability requires sending crafted HTTP requests to the router's web interface on port 80/443.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found in provided references
Restart Required: Yes
Instructions:
1. Check Tenda official website for firmware updates. 2. Download latest firmware for AX1803. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update completes.
🔧 Temporary Workarounds
Disable Guest WiFi
allTurn off guest WiFi functionality to remove attack surface
Access router admin interface > WiFi Settings > Guest Network > Disable
Restrict Management Access
allLimit router management interface access to trusted IPs only
Access router admin interface > Security > Access Control > Restrict to specific IPs
🧯 If You Can't Patch
- Isolate router on separate VLAN with strict firewall rules blocking external access to management interface
- Implement network monitoring for suspicious HTTP requests to /goform/WifiGuestSet endpoint
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface. If version is 1.0.0.1, device is vulnerable.
Check Version:
curl -s http://router-ip/login/Auth | grep version OR check web interface System Status page
Verify Fix Applied:
Verify firmware version has been updated to a version later than 1.0.0.1 in router admin interface.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /goform/WifiGuestSet with unusually long parameter values
- Router crash/reboot logs
- Failed authentication attempts to router admin
Network Indicators:
- HTTP traffic to router IP on port 80/443 with long guestWrlPwd/guestEn/guestSsid parameters
- Unusual outbound connections from router after exploitation
SIEM Query:
source="router_logs" AND (url="/goform/WifiGuestSet" AND (param_length>100 OR status=500))
🔗 References
- https://river-brow-763.notion.site/Tenda-AX1803-Buffer-Overflow-in-fromGetWifiGusetBasic-2e3a595a7aef80a78225db34317daa40#2e3a595a7aef801ab517e4af5631227a
- https://vuldb.com/?ctiid.342305
- https://vuldb.com/?id.342305
- https://vuldb.com/?submit.736063
- https://vuldb.com/?submit.736064
- https://vuldb.com/?submit.736065
- https://vuldb.com/?submit.736066
- https://vuldb.com/?submit.736067
- https://www.tenda.com.cn/