CVE-2025-29214

7.5 HIGH

📋 TL;DR

Tenda AX12 routers running firmware version 22.03.01.46_CN contain a stack-based buffer overflow vulnerability in the setMacFilterCfg function. This allows remote attackers to execute arbitrary code or cause denial of service by sending specially crafted requests. Only users with this specific firmware version are affected.

💻 Affected Systems

Products:
  • Tenda AX12
Versions: v22.03.01.46_CN
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Chinese firmware version mentioned. Other versions or regional variants may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistent backdoor installation, and lateral movement to connected networks.

🟠

Likely Case

Denial of service causing router crashes and network disruption, potentially requiring physical reset.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and external access is restricted.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof-of-concept details are publicly available in the provided references. Exploitation requires access to the router's web interface or API endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda's official website for updated firmware

Vendor Advisory: Not publicly available at time of analysis

Restart Required: Yes

Instructions:

1. Visit Tenda's official support website. 2. Download the latest firmware for AX12. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the vulnerable interface

Network Segmentation

all

Isolate the router from critical internal networks

🧯 If You Can't Patch

  • Replace the router with a different model or vendor
  • Implement strict network access controls to limit who can reach the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or similar section

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version is no longer v22.03.01.46_CN after update

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed requests to /goform/setMacFilterCfg
  • Router crash/reboot events in system logs
  • Unusual POST requests with large payloads

Network Indicators:

  • Unusual traffic patterns to router management port
  • HTTP requests with oversized parameters to vulnerable endpoint

SIEM Query:

source="router_logs" AND (uri="/goform/setMacFilterCfg" OR message="crash" OR message="reboot")

🔗 References

📤 Share & Export