CVE-2025-0848

6.5 MEDIUM

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Tenda A18 routers allows remote attackers to execute arbitrary code by sending specially crafted HTTP POST requests to the /goform/SetCmdlineRun endpoint. This affects all Tenda A18 routers running firmware version 15.13.07.09 or earlier. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Tenda A18
Versions: Up to and including 15.13.07.09
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the vulnerable endpoint is part of the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to install malware, pivot to internal networks, or create persistent backdoors.

🟠

Likely Case

Device takeover enabling network traffic interception, DNS hijacking, credential theft, and lateral movement within the network.

🟢

If Mitigated

Denial of service or device crash if exploit fails, but device remains vulnerable to subsequent attacks.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests, making internet-exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, attackers can exploit this from within the network without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly disclosed on GitHub, making weaponization straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware for A18 model. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router after installation.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to trusted network segment only

🧯 If You Can't Patch

  • Replace affected Tenda A18 routers with patched or alternative models
  • Implement strict network access controls to limit access to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools. If version is 15.13.07.09 or earlier, device is vulnerable.

Check Version:

No CLI command - check via web interface at http://router-ip or via router admin panel

Verify Fix Applied:

After firmware update, verify version is higher than 15.13.07.09 in admin interface.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goform/SetCmdlineRun with unusual wpapsk_crypto5g parameter values
  • Router crash logs or unexpected reboots

Network Indicators:

  • Unusual HTTP traffic to router management interface from external IPs
  • Multiple failed exploit attempts to vulnerable endpoint

SIEM Query:

source="router_logs" AND (uri_path="/goform/SetCmdlineRun" OR method="POST" AND uri_path CONTAINS "SetCmdlineRun")

🔗 References

📤 Share & Export