CVE-2022-25455

9.8 CRITICAL

📋 TL;DR

This vulnerability is a stack overflow in Tenda AC6 routers that allows remote attackers to execute arbitrary code by sending a specially crafted request to the SetIpMacBind function. It affects Tenda AC6 routers running firmware version 15.03.05.09_multi. Attackers can potentially gain full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: v15.03.05.09_multi
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: This specific firmware version is vulnerable. Other versions may also be affected but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to intercept network traffic, install malware, pivot to internal networks, or create persistent backdoors.

🟠

Likely Case

Remote code execution resulting in device takeover, enabling attackers to modify router settings, intercept traffic, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers from the internet.
🏢 Internal Only: MEDIUM - If internet access is blocked, attackers would need internal network access, but the vulnerability is still remotely exploitable from the LAN side.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories. The vulnerability requires no authentication and has a simple exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC6 model
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and install new firmware
6. Reboot router after installation

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router administration interface

Access router admin panel -> Advanced Settings -> Remote Management -> Disable

Network segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace affected router with different model or vendor
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or About page

Check Version:

Check via web interface or SSH if enabled: cat /proc/version

Verify Fix Applied:

Verify firmware version is no longer 15.03.05.09_multi after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to SetIpMacBind endpoint
  • Large payloads in HTTP POST requests to router management interface
  • Multiple failed login attempts followed by exploitation attempts

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns indicating command and control communication
  • Port scans targeting router management ports

SIEM Query:

source="router_logs" AND (uri="/goform/SetIpMacBind" OR method="POST" AND size>1000)

🔗 References

📤 Share & Export