CVE-2025-14636

3.7 LOW

📋 TL;DR

This vulnerability in Tenda AX9 routers allows attackers to exploit weak hash functions in the firmware update mechanism via the httpd component. Attackers could potentially upload malicious firmware images, though exploitation requires high complexity. All users of affected Tenda AX9 routers are at risk.

💻 Affected Systems

Products:
  • Tenda AX9
Versions: 22.03.01.46
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version; other Tenda models may have similar issues but are not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could upload malicious firmware to compromise the router, potentially gaining persistent access, intercepting network traffic, or using it as a foothold into internal networks.

🟠

Likely Case

Limited impact due to high exploitation complexity; attackers would need to bypass other security controls to achieve meaningful compromise.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be minimal even if exploited.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploit details are publicly available but require significant technical skill to weaponize effectively.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Network Segmentation

all

Isolate router management interface to trusted network segments only

🧯 If You Can't Patch

  • Replace affected routers with patched or different models
  • Implement strict network access controls to limit exposure of router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is 22.03.01.46, device is vulnerable.

Check Version:

Check via router web interface or SSH if enabled: cat /proc/version or similar router-specific commands

Verify Fix Applied:

Verify firmware version has been updated to a version later than 22.03.01.46.

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware update attempts
  • HTTP requests to image_check endpoint with suspicious payloads

Network Indicators:

  • Unexpected traffic to router management ports from external sources
  • Firmware download attempts from unusual sources

SIEM Query:

source_ip=external AND dest_port=80 AND uri_path CONTAINS 'image_check'

🔗 References

📤 Share & Export