CVE-2025-25429

4.8 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in Trendnet TEW-929DRU routers allows attackers to inject malicious scripts into the device's web interface. When exploited, these scripts execute in the context of authenticated users who view the affected page. This affects all users of vulnerable TEW-929DRU routers with the specific firmware version.

💻 Affected Systems

Products:
  • Trendnet TEW-929DRU
Versions: 1.0.0.10
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default web interface configuration. The router must be accessible via network to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator credentials, hijack sessions, redirect users to malicious sites, or perform administrative actions on the router without authorization.

🟠

Likely Case

Attackers with network access could inject scripts that steal session cookies or redirect users to phishing pages when they access the schedule management interface.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to internal network users who access the router's web interface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the router's web interface and knowledge of the vulnerable parameter. The vulnerability is stored/persistent, making it more dangerous than reflected XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check Trendnet's official website for firmware updates. 2. Download the latest firmware for TEW-929DRU. 3. Log into router web interface. 4. Navigate to firmware update section. 5. Upload and apply the new firmware.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router web interface

Log into router interface > Advanced > Remote Management > Disable

Restrict LAN access

all

Limit which devices can access router administration

Log into router interface > Advanced > Access Control > Configure allowed IPs

🧯 If You Can't Patch

  • Segment router management to isolated VLAN
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to /addschedule.htm, attempt to inject script via r_name parameter

Check Version:

Log into router web interface > Status > Firmware Version

Verify Fix Applied:

After firmware update, test the same injection to confirm sanitization

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /addschedule.htm
  • JavaScript payloads in URL parameters

Network Indicators:

  • Multiple requests to router web interface from single source
  • Script tags in HTTP requests

SIEM Query:

source="router_logs" AND (uri="/addschedule.htm" OR param="r_name") AND (content="script" OR content="javascript:")

🔗 References

📤 Share & Export