CVE-2025-3802

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote attackers to execute arbitrary code by manipulating the pingIP parameter. This affects devices running specific firmware versions, potentially giving attackers full control over the router. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Tenda W12
  • Tenda i24
Versions: 3.0.0.4(2887) through 3.0.0.5(3644)
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. The httpd service runs with root privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Router takeover enabling DNS hijacking, man-in-the-middle attacks, and botnet recruitment.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict ingress filtering, though internal network exposure remains.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing routers directly exposed to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, but requires local network presence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. The vulnerability requires sending a specially crafted HTTP request to the router's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware for your model. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router after update.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate routers from critical internal networks

🧯 If You Can't Patch

  • Replace affected routers with patched or different vendor models
  • Implement strict network ACLs to block all inbound traffic to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 3.0.0.4(2887) or 3.0.0.5(3644), device is vulnerable.

Check Version:

Login to router web interface and check System Status or Firmware Upgrade section

Verify Fix Applied:

Verify firmware version has been updated to a version higher than 3.0.0.5(3644) or check Tenda security advisory for fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/PingSet endpoint
  • Multiple failed ping attempts with malformed IP addresses
  • Router crash/restart logs

Network Indicators:

  • HTTP traffic to router port 80/443 with unusually long pingIP parameters
  • Outbound connections from router to unknown IPs post-exploit

SIEM Query:

source="router_logs" AND (uri="/goform/PingSet" OR message="*pingIP*" OR message="*buffer overflow*")

🔗 References

📤 Share & Export