CVE-2025-44172

6.5 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Tenda AC6 routers by exploiting a stack overflow in the setSmartPowerManagement function. Attackers can send specially crafted requests to the time parameter, potentially gaining full control of affected devices. This affects all users running vulnerable firmware versions of Tenda AC6 routers.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: V15.03.05.16 and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with web management interface enabled. Remote management may increase exposure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and participation in botnets.

🟠

Likely Case

Router takeover allowing DNS hijacking, credential theft from network traffic, and use as pivot point for internal network attacks.

🟢

If Mitigated

Denial of service causing router reboot or temporary unavailability if exploit fails or is blocked.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web interfaces accessible from WAN side.
🏢 Internal Only: MEDIUM - Attackers on local network could also exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains detailed analysis and likely exploit code. Stack overflow vulnerabilities in embedded devices are frequently weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support website for firmware updates. 2. Download latest firmware for AC6 model. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload new firmware file. 6. Wait for automatic reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to trusted network

🧯 If You Can't Patch

  • Replace affected routers with different models or brands
  • Implement strict firewall rules blocking all external access to router management ports (typically 80, 443, 8080)

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or System Tools > Firmware Upgrade

Check Version:

curl -s http://router-ip/goform/getStatus | grep version or check web interface

Verify Fix Applied:

Verify firmware version is newer than V15.03.05.16 after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setSmartPowerManagement
  • Multiple failed login attempts followed by exploitation attempts
  • Router reboot logs without user action

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic spikes to router management interface

SIEM Query:

source="router.log" AND ("setSmartPowerManagement" OR "time parameter overflow")

🔗 References

📤 Share & Export