CVE-2025-10432

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda AC1206 routers via a stack-based buffer overflow in the HTTP request handler. Attackers can exploit this by sending specially crafted requests to manipulate the wanMTU parameter. All users running the affected firmware version are at risk.

💻 Affected Systems

Products:
  • Tenda AC1206
Versions: 15.03.06.23
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web management interface that is typically enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement into connected devices.

🟠

Likely Case

Router takeover enabling attackers to modify DNS settings, intercept traffic, or deploy malware to connected devices.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict inbound filtering, though internal exploitation remains possible.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces exposed.
🏢 Internal Only: HIGH - Even if not internet-facing, attackers on the local network can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC1206
3. Log into router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update completes

🔧 Temporary Workarounds

Disable remote management

all

Disable web management interface access from WAN/Internet

Network segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace affected routers with different models that receive security updates
  • Implement strict firewall rules blocking all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is 15.03.06.23, device is vulnerable.

Check Version:

Login to router web interface and check System Status or Firmware Version page

Verify Fix Applied:

After firmware update, verify version has changed from 15.03.06.23 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goform/AdvSetMacMtuWa with unusual wanMTU parameter values
  • Router crash/reboot logs

Network Indicators:

  • Unusual HTTP traffic to router management port (typically 80/443)
  • Exploit pattern matching known PoC signatures

SIEM Query:

source="router_logs" AND (uri="/goform/AdvSetMacMtuWa" OR uri="*AdvSetMacMtuWa*") AND (param="wanMTU" OR param="*MTU*")

🔗 References

📤 Share & Export