CVE-2025-15076

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication and perform path traversal attacks on Tenda CH22 routers. Attackers can access restricted files and directories without proper credentials. Users of Tenda CH22 routers with firmware version 1.0.0.1 are affected.

💻 Affected Systems

Products:
  • Tenda CH22 Router
Versions: 1.0.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access sensitive configuration files, modify router settings, and potentially gain persistent access to the network.

🟠

Likely Case

Unauthorized access to router configuration files, potential credential theft, and network reconnaissance.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely, making internet-facing routers particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making this easily exploitable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware
3. Access router admin interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface from untrusted networks

Access Control Lists

all

Restrict access to router management interface to trusted IPs only

🧯 If You Can't Patch

  • Replace affected routers with updated models or different vendors
  • Implement strict network monitoring and intrusion detection for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.0.0.1, the device is vulnerable.

Check Version:

Access router web interface at http://[router-ip] and check System Status or Firmware Version page

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.0.0.1.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /public/ directory
  • Multiple failed authentication attempts followed by successful access
  • Access to configuration files from unauthorized IPs

Network Indicators:

  • HTTP requests to /public/ with traversal patterns (../)
  • Unauthorized access to router management interface from external IPs

SIEM Query:

source="router_logs" AND (uri="/public/*" OR uri CONTAINS "../")

🔗 References

📤 Share & Export