CVE-2025-50262

7.5 HIGH

📋 TL;DR

This buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code or crash the device by sending specially crafted requests to the formSetQosBand function. It affects users running vulnerable firmware versions on Tenda AC6 routers. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: v15.03.05.16_multi
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full router compromise, credential theft, network traffic interception, and lateral movement to internal networks.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset and disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited to denial of service if exploit fails to achieve code execution, still requiring router reboot.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the exploit appears to be remotely accessible via web interface.
🏢 Internal Only: MEDIUM - If router management interface is only accessible internally, risk is reduced but still significant for network availability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires access to router web interface; authentication status unclear from available information. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. Download latest firmware for AC6 model
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Wait for router to reboot

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Restrict management interface access

all

Limit web interface access to specific trusted IP addresses

🧯 If You Can't Patch

  • Segment network to isolate router management interface
  • Implement strict firewall rules to block unnecessary traffic to router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System Status or About page

Check Version:

No CLI command; check via web interface at 192.168.0.1 or router's IP address

Verify Fix Applied:

Verify firmware version has been updated to a version newer than v15.03.05.16_multi

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unusual POST requests to formSetQosBand endpoint
  • Router crash/reboot events

Network Indicators:

  • Unusual traffic patterns to router management interface
  • Large payloads sent to formSetQosBand endpoint

SIEM Query:

source="router_logs" AND (uri="/goform/setQosBand" OR message="buffer overflow" OR message="crash")

🔗 References

📤 Share & Export