CVE-2022-25550

7.5 HIGH

📋 TL;DR

A stack overflow vulnerability in Tenda AX1806 routers allows attackers to cause Denial of Service by sending specially crafted deviceName parameters to the saveParentControlInfo function. This affects Tenda AX1806 v1.0.0.1 devices, potentially disrupting network connectivity for users.

💻 Affected Systems

Products:
  • Tenda AX1806
Versions: v1.0.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with default configurations; parent control feature must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, persistent network outage until manual intervention.

🟠

Likely Case

Temporary service disruption, router reboot needed to restore functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repositories; exploitation requires network access to vulnerable interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check Tenda website for firmware updates addressing CVE-2022-25550.

🔧 Temporary Workarounds

Disable Parent Control Feature

all

Turn off parent control functionality to remove vulnerable code path.

Access router admin interface > Parental Controls > Disable

Restrict Network Access

linux

Block external access to router admin interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Segment vulnerable devices on isolated network segments
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is v1.0.0.1, device is vulnerable.

Check Version:

curl -s http://router-ip/status | grep version

Verify Fix Applied:

Verify firmware version has been updated beyond v1.0.0.1 or parent control feature is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Repeated connection attempts to parent control endpoint
  • Router reboot events following malformed requests

Network Indicators:

  • Unusual HTTP POST requests to saveParentControlInfo endpoint with long deviceName parameters

SIEM Query:

source="router.log" AND "saveParentControlInfo" AND deviceName.length>100

🔗 References

📤 Share & Export