CVE-2025-29029

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code by sending specially crafted requests to the formSetSpeedWan function. This affects Tenda AC6 routers running firmware version 15.03.05.16. Attackers can potentially gain full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: v15.03.05.16
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to intercept network traffic, install malware, or pivot to internal networks.

🟠

Likely Case

Router compromise leading to DNS hijacking, credential theft, or botnet recruitment.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules and not internet-facing.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub issue contains technical details that could be weaponized. Buffer overflow vulnerabilities in network devices are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC6 model. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable WAN management access

all

Prevent external access to router management interface

Log into router admin panel
Navigate to Advanced > System Tools > Remote Management
Disable remote management/access from WAN

Network segmentation

all

Isolate router management interface to internal network only

Configure firewall rules to block inbound traffic to router management ports (typically 80/443)
Use VLANs to separate management traffic

🧯 If You Can't Patch

  • Replace vulnerable device with a different model or vendor
  • Implement strict network access controls to limit who can reach the router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools > Firmware Upgrade

Check Version:

Log into router web interface and check firmware version in System Status page

Verify Fix Applied:

Verify firmware version has been updated to a version newer than v15.03.05.16

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to formSetSpeedWan endpoint
  • Multiple failed login attempts followed by buffer overflow patterns
  • Router reboot logs without user action

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic patterns indicating command and control communication

SIEM Query:

source="router_logs" AND (uri="*/goform/setSpeedWan" OR message="*buffer overflow*" OR message="*segmentation fault*")

🔗 References

📤 Share & Export