QID 731278

Date Published: 2024-03-21

QID 731278: Tenda Router AC11 Remote Code Execution (RCE) Vulnerability

Tenda AC11 devices contain a stack buffer overflow vulnerability in /goform/setmac which allows attackers to execute code via a crafted post request.

Affected Versions:
Tenda AC11 firmware through 02.03.01.104_CN

QID Detection Logic (Unauthenticated):
This QID sends a crafted payload as an HTTP POST request that triggers a callback to the scanner, if vulnerable. Please note that this QID relies on a callback to the scanner on a random port. The target must be enabled to connect back to any random port on the scanner.

Successful exploitation of this vulnerability could lead to unauthorized access, data exfiltration, and complete compromise of the affected router.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to apply the latest firmware update provided by Tenda to fix the remote command injection vulnerability (CVE-2021-31755).

    Vendor References

    CVEs related to QID 731278

    Software Advisories
    Advisory ID Software Component Link
    NA URL Logo www.tendacn.com/download/detail-3918.html