![]() |
Disclosure timeline: Reported to Tenda Security (security@tenda.com.cn) on Jan 12, 2026 – no acknowledgment as of April 17, 2026.
The squashfs extracts to a standard Linux environment—kernel 3.10.90 (released in 2016, ). The "Hidden" Debug Interface The most alarming discovery is an undocumented UDP debugging service running on port 7329 . Unlike the official web UI (port 80) or telnet (port 23, disabled by default), this service cannot be disabled via the GUI.
# Using binwalk to carve the squashfs $ binwalk -Me Tenda_MX12_V1.0.0.24_EN.bin 256 0x100 TRX firmware header, image size: 14876672 bytes 512 0x200 LZMA compressed data 1456128 0x163800 Squashfs filesystem, little endian, version 4.0 Tenda Mx12 Firmware
The Tenda MX12 is a textbook case of "cheap hardware, dangerous software." While it works fine as a basic access point, its security posture is unacceptable for any environment containing sensitive data. Unless Tenda releases a complete rewrite (unlikely), we recommend avoiding this product entirely.
An authenticated attacker (or any user on the LAN if the session check is bypassed) can inject arbitrary commands via the ping diagnostic tool. Example: Unlike the official web UI (port 80) or
By: Security Research Unit Date: April 17, 2026
No CSRF token validation exists on this endpoint. Using strings on the squashfs root, we discovered: An authenticated attacker (or any user on the
// Pseudocode reversed from libhttpd.so (Ghidra) void do_debug_cmd(char *cmd) char buf[256]; if (strcmp(cmd, "tendadebug2019") == 0) // Hidden factory reset + diagnostic dump system("/usr/sbin/factory_reset.sh --full"); system("/usr/sbin/dump_regs > /tmp/debug.log"); else if (strstr(cmd, "ping")) // Command injection primitive sprintf(buf, "ping -c 4 %s", cmd + 4); system(buf);
Disclosure timeline: Reported to Tenda Security (security@tenda.com.cn) on Jan 12, 2026 – no acknowledgment as of April 17, 2026.
The squashfs extracts to a standard Linux environment—kernel 3.10.90 (released in 2016, ). The "Hidden" Debug Interface The most alarming discovery is an undocumented UDP debugging service running on port 7329 . Unlike the official web UI (port 80) or telnet (port 23, disabled by default), this service cannot be disabled via the GUI.
# Using binwalk to carve the squashfs $ binwalk -Me Tenda_MX12_V1.0.0.24_EN.bin 256 0x100 TRX firmware header, image size: 14876672 bytes 512 0x200 LZMA compressed data 1456128 0x163800 Squashfs filesystem, little endian, version 4.0
The Tenda MX12 is a textbook case of "cheap hardware, dangerous software." While it works fine as a basic access point, its security posture is unacceptable for any environment containing sensitive data. Unless Tenda releases a complete rewrite (unlikely), we recommend avoiding this product entirely.
An authenticated attacker (or any user on the LAN if the session check is bypassed) can inject arbitrary commands via the ping diagnostic tool. Example:
By: Security Research Unit Date: April 17, 2026
No CSRF token validation exists on this endpoint. Using strings on the squashfs root, we discovered:
// Pseudocode reversed from libhttpd.so (Ghidra) void do_debug_cmd(char *cmd) char buf[256]; if (strcmp(cmd, "tendadebug2019") == 0) // Hidden factory reset + diagnostic dump system("/usr/sbin/factory_reset.sh --full"); system("/usr/sbin/dump_regs > /tmp/debug.log"); else if (strstr(cmd, "ping")) // Command injection primitive sprintf(buf, "ping -c 4 %s", cmd + 4); system(buf);
| أدوات الموضوع | |
|
|
|
|
المواضيع المتشابهه
|
||||
| الموضوع | كاتب الموضوع | المنتدى | مشاركات | آخر مشاركة |
| فلاشه DALY STAR 777 HD MINI GOLD | حسام فتوح | DALY STAR HD | 28 | 2025/11/10 05:15 PM |
| فلاشه STAR GOLD 888 HD MINI | حسام فتوح | S | 40 | 2025/09/23 08:54 PM |
| فلاشة star gold sg-610hd mini | ميلاد عزيز | S | 31 | 2025/09/12 12:38 AM |
| فلاشه Daly Star 777 HD Gold+ Mini | حسام فتوح | DALY STAR HD | 12 | 2023/06/19 02:33 PM |
| فلاشه star gold sg 620 hd mini | حسام فتوح | S | 2 | 2021/07/21 08:18 PM |
____________________________________
عمالقة السات
الكنز المصرى العربى الذي تم إكتشافة عام 2021 من فريق عمالقة السات وبمشيئة الله سوف يتربع على عرش المنتديات
![]()