CVE-2022-25447
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Tenda AC6 routers via a stack overflow in the openSchedWifi function. Attackers can exploit this by sending specially crafted requests to the schedendtime parameter, potentially gaining full control of affected devices. Users of Tenda AC6 routers with firmware version 15.03.05.09_multi are affected.
💻 Affected Systems
- Tenda AC6 wireless router
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, credential theft, network traffic interception, and lateral movement to other devices on the network.
Likely Case
Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as part of a botnet.
If Mitigated
Limited impact if device is behind firewall with restricted WAN access and proper network segmentation.
🎯 Exploit Status
Public proof-of-concept code exists in GitHub repositories, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda website for firmware updates
2. If update available, download and install via router admin interface
3. Reboot router after installation
4. Verify firmware version is updated
🔧 Temporary Workarounds
Disable remote administration
allPrevent external access to router administration interface
Login to router admin panel -> Advanced Settings -> Remote Management -> Disable
Network segmentation
allIsolate router management interface from untrusted networks
Configure firewall rules to restrict access to router IP on ports 80/443
🧯 If You Can't Patch
- Replace affected router with a different model or vendor
- Place router behind a separate firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via admin interface (typically at 192.168.0.1 or 192.168.1.1)
Check Version:
curl -s http://router-ip/goform/getStatus | grep version or check web interface
Verify Fix Applied:
Verify firmware version is no longer 15.03.05.09_multi
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/openSchedWifi
- Multiple failed authentication attempts
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic to known malicious IPs
- Port scanning originating from router
SIEM Query:
source="router_logs" AND (uri="/goform/openSchedWifi" OR "schedendtime" IN request_body)