Tenda-specific modules in core Metasploit Framework
Metasploit's official modules focus more on popular enterprise brands (Cisco, Netgear, D-Link, TP-Link, etc.) or generic web command injection patterns. Tenda routers — being budget/SOHO devices common in markets like Kenya — tend to have vulnerabilities disclosed via Exploit-DB, GitHub PoCs, or researcher blogs, but **very few make it into Rapid7's official Metasploit repo**.
### Current Status (March 2026)
From recent searches and known sources:
- **No official Metasploit modules** exist in the main framework for Tenda routers (no `exploit/linux/http/tenda_*` or similar when you run `search tenda` in msfconsole).
- Older Tenda vulns (e.g., CVE-2018-5767 on AC15 RCE from 2018) have standalone Python exploits on Exploit-DB but were never ported to Metasploit.
- Recent 2025–2026 Tenda CVEs (e.g., command injection CVE-2025-13207 on N300/4G03, buffer overflows CVE-2025-7795 on FH451, CVE-2025-29384 on AC9, CVE-2025-1851 on AC7) usually come with:
- Standalone Python/Ruby PoCs
- Exploit-DB entries
- GitHub repos with proof-of-concepts
One notable exception: For **CVE-2025-29384** (out-of-bounds write / stack overflow on Tenda AC9 firmware), a researcher released a **Ruby-based Metasploit-compatible module** in a GitHub PoC repo (Otsmane-Ahmed/cve-2025-29384-poc). It's **not** in official Metasploit, but you can manually add it.
### How to Use the CVE-2025-29384 Metasploit-Style Module (if your Tenda is AC9 or similar vulnerable model)
1. Clone the repo:
```bash
git clone https://github.com/Otsmane-Ahmed/cve-2025-29384-poc.git
cd cve-2025-29384-poc
```
2. Copy the Ruby file to your local Metasploit modules path:
```bash
mkdir -p ~/.msf4/modules/exploits/linux/http/
cp tenda_ac9_stack_overflow.rb ~/.msf4/modules/exploits/linux/http/
```
3. Reload Metasploit modules:
```bash
msfconsole
reload_all
```
4. Search and use it:
```
search tenda_ac9
use exploit/linux/http/tenda_ac9_stack_overflow # or whatever the module path/name is
show options
set RHOSTS 192.168.0.1
set RPORT 80
set TARGETURI /goform/[relevant_endpoint_from_PoC]
exploit
```
- This is typically a DoS module (crashes the web server), but some variants aim for potential RCE.
- Check the repo's README for exact payload/target options — it's unauthenticated in many cases.
### Alternatives for Tenda Exploitation (Better Than Waiting for Official Modules)
Since official Metasploit is thin on Tenda:
1. **Routersploit** (still the best dedicated tool for SOHO routers like Tenda):
```bash
sudo python3 rsf.py
use scanners/autopwn
set target 192.168.0.1
run
```
- It has generic HTTP command injection, auth bypass, and some brand-specific checks that catch many Tenda flaws (even if not explicitly named "Tenda").
2. **Generic Metasploit Modules That Often Work on Tenda**:
- Command injection patterns: `search type:exploit cmd injection http`
- Examples: `exploit/multi/http/struts_code_exec` (if old Java), or generic ones like `exploit/unix/webapp/php_include` (rare).
- HTTP scanners: `auxiliary/scanner/http/http_version`, `auxiliary/scanner/http/router_login_scanner`
- Try: `use auxiliary/scanner/http/title` or `use auxiliary/scanner/http/dir_listing` to fingerprint.
3. **Manual Porting of PoCs**:
- Grab Python exploits from Exploit-DB (search "Tenda" there — many 2025 entries like FH451 buffer overflow).
- Convert to Metasploit Ruby format (use existing modules as templates — it's straightforward if you're intermediate).
- Submit to Rapid7 if you want (they accept PRs).
### Quick Check in Your msfconsole Right Now
Run these and paste the output if you want me to interpret:
```
search tenda
search type:exploit http buffer overflow 2025
search cve:2025 router
```
**Bottom line for your service gigs**: Stick with **Routersploit autopwn** + **Nmap vuln scripts** + **Nuclei iot/templates** for Tenda audits — they're more reliable and cover 90% of real-world Tenda issues without needing rare Metasploit modules. If a client has a specific CVE (e.g., AC9 CVE-2025-29384), add that third-party module manually.
Tell me your exact Tenda model/firmware (from the admin page) or any CVE you're targeting — I can hunt for the latest PoC/module links or walk you through adapting one. Let's find something exploitable in a safe lab! 🔍
Comments
Post a Comment