CVE-2023-25210

9.8 CRITICAL

📋 TL;DR

CVE-2023-25210 is a critical stack overflow vulnerability in Tenda AC5 routers that allows attackers to cause denial of service or execute arbitrary code by sending crafted payloads to the fromSetSysTime function. This affects all users running vulnerable firmware versions of Tenda AC5 routers. Attackers can potentially gain full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC5 router
Versions: US_AC5V1.0RTL_V15.03.06.28 and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface. All devices running vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistence installation, network pivoting, and data exfiltration

🟠

Likely Case

Denial of service causing router crashes and network disruption, potentially followed by malware deployment

🟢

If Mitigated

Limited impact with proper network segmentation and firewall rules blocking external access to management interfaces

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with management interfaces exposed
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub. Exploitation requires sending crafted HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda website for latest firmware

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Visit Tenda support website 2. Download latest firmware for AC5 3. Log into router admin panel 4. Navigate to System Tools > Firmware Upgrade 5. Upload and install new firmware 6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router management interface

Network segmentation

all

Isolate router management interface to trusted network segment

🧯 If You Can't Patch

  • Replace affected devices with patched or alternative models
  • Implement strict firewall rules blocking all external access to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin panel under System Status or System Tools

Check Version:

Login to router web interface and check System Status page

Verify Fix Applied:

Verify firmware version is newer than US_AC5V1.0RTL_V15.03.06.28

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed HTTP requests to /goform/setSysTime
  • Router crash/reboot logs
  • Unusual process execution

Network Indicators:

  • HTTP POST requests to /goform/setSysTime with large payloads
  • Unusual traffic to router management port

SIEM Query:

source="router_logs" AND (uri_path="/goform/setSysTime" OR event="crash" OR event="reboot")

🔗 References

📤 Share & Export