Command Injection Vulnerability in Tenda AC6 Router Software
CVE-2024-10697

9.8CRITICAL

Key Information:

Vendor
Tenda
Status
Vendor
CVE Published:
2 November 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A severe security flaw exists within the Tenda AC6 router's API endpoint, particularly in the function formWriteFacMac located at /goform/WriteFacMac. This vulnerability allows attackers to carry out command injection attacks. By manipulating specific input parameters, an unauthorized user can execute arbitrary commands on the affected device, potentially compromising its integrity. The vulnerability can be exploited remotely, making it accessible without physical access to the device. It is crucial for users of Tenda AC6 routers, especially version 15.03.05.19, to be aware of this risk and implement necessary security measures to safeguard their networks.

Affected Version(s)

AC6 15.03.05.19

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

theRaz0r (VulDB User)
.