CVE-2025-14655

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Tenda AC20 routers allows remote attackers to execute arbitrary code by manipulating the rebootTime parameter. This affects Tenda AC20 routers running firmware version 16.03.08.12. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC20
Versions: 16.03.08.12
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version; other versions may be unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Device takeover for botnet enrollment, credential theft, or network traffic interception.

🟢

If Mitigated

Denial of service or device reboot if exploit fails or protections block execution.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices prime targets.
🏢 Internal Only: MEDIUM - Internal devices still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

Check Tenda website for firmware updates. If available, download and install via router admin interface. Reboot router after update.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router admin interface

Network segmentation

all

Isolate router management interface from untrusted networks

🧯 If You Can't Patch

  • Replace affected devices with patched or different models
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 16.03.08.12, device is vulnerable.

Check Version:

Check via router web interface at 192.168.0.1 or 192.168.1.1

Verify Fix Applied:

Verify firmware version has changed from 16.03.08.12 after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SetSysAutoRebbotCfg
  • Multiple failed reboot attempts
  • Unexpected device reboots

Network Indicators:

  • Suspicious traffic to router management port (typically 80/443)
  • Exploit pattern matching in network traffic

SIEM Query:

source_ip=* dest_ip=router_ip dest_port=80 uri_path="/goform/SetSysAutoRebbotCfg" method=POST

🔗 References

📤 Share & Export