Sploit.io - Search

Product: o1_firmware, version: 1.0.0.7\(10648\)

CVE-2024-8226

Severity: Unknown

Description: A vulnerability has been found in Tenda O1 1.0.0.7(10648) and classified as critical. Affected by this vulnerability is the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Score: N/A

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.003530000
  • Percentile: 0.718620000
  • Date: 2025-01-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 7457
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Tenda O1 - Versions: 1.0.0.7(10648)

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-8226 is a critical stack-based buffer overflow in the Tenda O1 firmware version 1.0.0.7(10648). This flaw resides in the `formSetCfm` function within the `/goform/setcfm` file, specifically involving the manipulation of the `funcpara1` argument. The vulnerability allows remote attackers to execute arbitrary code by exploiting the buffer overflow, potentially leading to full system compromise.

    The CVSS v3.1 base score of 8.8 (HIGH) underscores the severity of this issue. The attack vector is network-based, requiring low attack complexity and low privileges, with no user interaction needed. This makes the vulnerability highly exploitable, especially given that the exploit has been publicly disclosed and may already be in use.

    The potential impacts are severe:
    - **Confidentiality**: Attackers could gain unauthorized access to sensitive data stored on the device.
    - **Integrity**: Malicious actors could alter system configurations or firmware, leading to persistent compromise.
    - **Availability**: Exploitation could crash the device or render it inoperable, disrupting operations.

    The likelihood of exploitation is high due to the public availability of the exploit and the lack of vendor response to the disclosure. Organizations using the affected Tenda O1 devices are at significant risk of targeted attacks, particularly in environments where these devices are exposed to the internet.

    2. Potential Attack Scenarios
    A potential attack scenario involves an attacker targeting a Tenda O1 device exposed to the internet. The attacker crafts a malicious HTTP request containing an oversized payload for the `funcpara1` argument and sends it to the `/goform/setcfm` endpoint. This payload triggers the stack-based buffer overflow, allowing the attacker to overwrite critical memory regions and execute arbitrary code on the device.

    Once the attacker gains control, they could:
    - Install malware or backdoors to maintain persistent access.
    - Exfiltrate sensitive data, such as network configurations or credentials.
    - Use the compromised device as a pivot point to attack other systems within the network.
    - Disrupt operations by crashing the device or altering its functionality.

    This scenario is particularly concerning for organizations using Tenda O1 devices in critical infrastructure or IoT environments, where such compromises could lead to significant operational and reputational damage.

    3. Mitigation Recommendations
    Immediate action is required to mitigate the risks associated with this vulnerability:
    - **Patch or Update**: Discontinue use of the affected firmware version (1.0.0.7(10648)) and upgrade to a patched version if and when the vendor releases one. Monitor the vendor’s website (https://www.tenda.com.cn/) for updates.
    - **Network Segmentation**: Isolate Tenda O1 devices from critical network segments and restrict access to trusted IP addresses only.
    - **Firewall Rules**: Implement strict firewall rules to block unauthorized access to the `/goform/setcfm` endpoint.
    - **Monitoring and Logging**: Enable detailed logging and monitoring of network traffic to detect and respond to suspicious activity.
    - **Compensating Controls**: If patching is not immediately possible, consider deploying intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts.

    Given the lack of vendor response, organizations should also consider replacing Tenda O1 devices with alternative solutions from vendors with a more proactive security posture.

    4. Executive Summary
    CVE-2024-8226 is a critical vulnerability in Tenda O1 devices that allows remote attackers to execute arbitrary code via a stack-based buffer overflow. This flaw poses a significant risk to organizations using the affected devices, as it can lead to data breaches, system compromise, and operational disruptions. The vulnerability is highly exploitable, with publicly available exploits increasing the likelihood of attacks.

    To protect against this threat, organizations must take immediate action, including isolating affected devices, applying patches if available, and implementing network security controls. The lack of vendor response further complicates the situation, necessitating a proactive approach to mitigate risks. Addressing this vulnerability is critical to safeguarding sensitive data, maintaining operational continuity, and protecting organizational reputation.

    CVE-2024-8227

    Severity: Unknown

    Description: A vulnerability was found in Tenda O1 1.0.0.7(10648) and classified as critical. Affected by this issue is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

    CVSS Score: N/A

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.003530000
    • Percentile: 0.718620000
    • Date: 2025-01-19

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7457
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Tenda O1 - Versions: 1.0.0.7(10648)

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-8227 is a critical stack-based buffer overflow in the Tenda O1 router firmware version 1.0.0.7(10648). This flaw resides in the `fromDhcpSetSer` function within the `/goform/DhcpSetSer` file, where improper handling of arguments such as `dhcpStartIp`, `dhcpEndIp`, `dhcpGw`, `dhcpMask`, `dhcpLeaseTime`, `dhcpDns1`, and `dhcpDns2` allows for remote exploitation. The CVSS v3.1 base score of 8.8 (HIGH) underscores the severity of this issue, with high impacts on confidentiality, integrity, and availability.

      The likelihood of exploitation is significant due to the public disclosure of the exploit and the lack of vendor response to the initial disclosure. Attackers can leverage this vulnerability remotely without requiring user interaction, making it highly accessible. The ease of exploitation is further amplified by the availability of proof-of-concept (PoC) code, which lowers the technical barrier for attackers.

      The potential business impact is severe. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to full system compromise. This could result in unauthorized access to sensitive data, disruption of network services, and manipulation of router configurations. The lack of vendor response increases the risk, as no patches or mitigations have been provided to date.

      2. Potential Attack Scenarios
      One potential attack scenario involves an attacker targeting a Tenda O1 router exposed to the internet. The attacker crafts a malicious DHCP configuration request containing oversized or malformed data for the vulnerable arguments (`dhcpStartIp`, `dhcpEndIp`, etc.). This request is sent to the router's web interface, triggering the buffer overflow in the `fromDhcpSetSer` function.

      The overflow overwrites critical memory regions, allowing the attacker to execute arbitrary code with elevated privileges. Once inside the system, the attacker could install malware, exfiltrate sensitive data, or pivot to other devices on the network. The outcome could include complete control over the router, enabling further attacks such as man-in-the-middle (MITM) attacks, DNS hijacking, or ransomware deployment.

      3. Mitigation Recommendations
      Immediate action is required to mitigate this vulnerability. Since the vendor has not yet released a patch, the following steps are recommended:
      - Disable remote access to the Tenda O1 router's web interface if it is not required.
      - Implement network segmentation to isolate the router from critical systems, reducing the attack surface.
      - Monitor network traffic for unusual activity, particularly unexpected DHCP configuration requests.
      - Apply strict firewall rules to limit access to the router's management interface.
      - Regularly check the vendor's website for firmware updates and apply them as soon as they become available.

      For additional guidance, refer to the following resources:
      - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-8227
      - VulDB Entry: https://vuldb.com/?id.275936
      - GitHub Exploit Details: https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O1V1.1/fromDhcpSetSer.md

      4. Executive Summary
      CVE-2024-8227 is a critical vulnerability in the Tenda O1 router firmware that allows remote attackers to execute arbitrary code via a stack-based buffer overflow. This flaw poses a high risk to organizations using the affected devices, as it can lead to unauthorized access, data breaches, and service disruptions. The public availability of exploit code increases the urgency of addressing this issue.

      While the vendor has not yet provided a patch, immediate mitigation steps such as disabling remote access, implementing network segmentation, and monitoring for suspicious activity can reduce the risk. Organizations should prioritize this vulnerability due to its high potential for exploitation and significant business impact. Proactive measures are essential to safeguard network infrastructure and sensitive data.