CVE-2025-29029
📋 TL;DR
A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code by sending specially crafted requests to the formSetSpeedWan function. This affects Tenda AC6 routers running firmware version 15.03.05.16. Attackers can potentially gain full control of affected devices.
💻 Affected Systems
- Tenda AC6
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, allowing attackers to intercept network traffic, install malware, or pivot to internal networks.
Likely Case
Router compromise leading to DNS hijacking, credential theft, or botnet recruitment.
If Mitigated
Limited impact if device is behind firewall with strict inbound rules and not internet-facing.
🎯 Exploit Status
Public GitHub issue contains technical details that could be weaponized. Buffer overflow vulnerabilities in network devices are commonly exploited.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: Yes
Instructions:
1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC6 model. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.
🔧 Temporary Workarounds
Disable WAN management access
allPrevent external access to router management interface
Log into router admin panel
Navigate to Advanced > System Tools > Remote Management
Disable remote management/access from WAN
Network segmentation
allIsolate router management interface to internal network only
Configure firewall rules to block inbound traffic to router management ports (typically 80/443)
Use VLANs to separate management traffic
🧯 If You Can't Patch
- Replace vulnerable device with a different model or vendor
- Implement strict network access controls to limit who can reach the router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under System Status or System Tools > Firmware Upgrade
Check Version:
Log into router web interface and check firmware version in System Status page
Verify Fix Applied:
Verify firmware version has been updated to a version newer than v15.03.05.16
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to formSetSpeedWan endpoint
- Multiple failed login attempts followed by buffer overflow patterns
- Router reboot logs without user action
Network Indicators:
- Unusual outbound connections from router
- DNS queries to suspicious domains
- Traffic patterns indicating command and control communication
SIEM Query:
source="router_logs" AND (uri="*/goform/setSpeedWan" OR message="*buffer overflow*" OR message="*segmentation fault*")