CVE-2025-11325

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability exists in Tenda AC18 routers via the /goform/fast_setting_pppoe_set endpoint. Attackers can remotely exploit this by manipulating the Username parameter to execute arbitrary code. This affects Tenda AC18 router users running vulnerable firmware.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: 15.03.05.19(6318)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the web management interface's PPPoE configuration function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network pivoting, and persistent backdoor installation.

🟠

Likely Case

Router compromise allowing attackers to intercept network traffic, modify DNS settings, or launch attacks against internal devices.

🟢

If Mitigated

Limited impact if the router is behind a firewall with restricted WAN access or if the vulnerable interface is not exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists on GitHub, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda's website for firmware updates. 2. Download the latest firmware. 3. Log into router admin panel. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware.

🔧 Temporary Workarounds

Disable WAN access to admin interface

all

Prevent external access to the vulnerable endpoint by disabling remote administration.

Use firewall rules to block access

all

Block external access to port 80/443 on the router's WAN interface.

🧯 If You Can't Patch

  • Replace the vulnerable router with a different model or vendor
  • Isolate the router in a separate network segment with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin panel under System Status or System Tools > Firmware Upgrade.

Check Version:

Login to router web interface and check firmware version in system settings.

Verify Fix Applied:

Verify firmware version has been updated to a version newer than 15.03.05.19(6318).

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/fast_setting_pppoe_set with long Username parameters
  • Router reboot or crash logs

Network Indicators:

  • External IP addresses accessing router admin interface on port 80/443
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (url="/goform/fast_setting_pppoe_set" OR "pppoe_set") AND (username_length>100 OR contains(username,"\x"))

🔗 References

📤 Share & Export