CVE-2025-10442

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on Tenda AC9 and AC15 routers through command injection in the formexeCommand function. Attackers can exploit this without authentication to gain full control of affected devices. Users running vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Tenda AC9
  • Tenda AC15
Versions: 15.03.05.14
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web management interface accessible. Default configurations typically expose this interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with persistent backdoor installation, credential theft, network traffic interception, and lateral movement to internal devices.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential harvesting, and botnet recruitment.

🟢

If Mitigated

Limited impact with proper network segmentation and firewall rules preventing external access to router admin interface.

🌐 Internet-Facing: HIGH - Remote exploitation is possible without authentication, making internet-exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires network access to router admin interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available. Exploitation requires sending crafted HTTP POST requests to /goform/exeCommand endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda for latest firmware > 15.03.05.14

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware upgrade section. 3. Download latest firmware from Tenda website. 4. Upload and install firmware. 5. Reboot router.

🔧 Temporary Workarounds

Disable WAN access to admin interface

all

Prevent external access to router management interface

Network segmentation

all

Isolate router management interface to dedicated VLAN

🧯 If You Can't Patch

  • Replace affected routers with patched or alternative models
  • Implement strict firewall rules blocking all external access to router IP on ports 80/443

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or About page

Check Version:

Login to router web interface and navigate to system information page

Verify Fix Applied:

Verify firmware version is greater than 15.03.05.14 and test endpoint with safe payload

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /goform/exeCommand with unusual parameters
  • System logs showing unexpected command execution

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control

SIEM Query:

http.url:"/goform/exeCommand" AND http.method:POST AND (cmdinput:* OR *cmdinput*)

🔗 References

📤 Share & Export