CVE-2025-50528

7.3 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code or crash the device by sending specially crafted requests to the fromNatStaticSetting function via the page parameter. This affects all users running vulnerable firmware versions. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: <= V15.03.05.19
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected firmware versions are vulnerable. The vulnerability is in the web management interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full router compromise, credential theft, network traffic interception, and lateral movement into connected networks.

🟠

Likely Case

Router crash causing denial of service, potentially requiring physical reset and disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited impact with proper network segmentation and firewall rules preventing external access to router management interface.

🌐 Internet-Facing: HIGH - Router management interfaces are often exposed to the internet by default, making them accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to pivot through networks or disrupt operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repository. Exploitation requires sending crafted HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda official website for firmware updates
2. Download latest firmware for AC6 model
3. Access router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router after installation

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace vulnerable router with different model or vendor
  • Implement strict firewall rules blocking all external access to router management ports (typically 80, 443, 8080)

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to System Status or About page, check firmware version against affected range.

Check Version:

curl -s http://router-ip/ | grep -i firmware || wget -qO- http://router-ip/goform/getStatus

Verify Fix Applied:

After firmware update, verify version is newer than V15.03.05.19 and test if vulnerable endpoint still responds to crafted requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/fromNatStaticSetting
  • Router crash/reboot events
  • Multiple failed login attempts followed by buffer overflow patterns

Network Indicators:

  • HTTP requests with unusually long page parameter values
  • Traffic to router management interface from unexpected sources

SIEM Query:

source="router_logs" AND (uri="/goform/fromNatStaticSetting" OR message="buffer overflow" OR message="segmentation fault")

🔗 References

📤 Share & Export