CVE-2025-55483

7.5 HIGH

📋 TL;DR

This CVE describes a buffer overflow vulnerability in Tenda AC6 routers, specifically in the formSetMacFilterCfg function. Attackers can exploit it by sending crafted requests with malicious macFilterType and deviceList parameters, potentially leading to remote code execution or denial of service. Users of Tenda AC6 routers with the affected firmware are at risk.

💻 Affected Systems

Products:
  • Tenda AC6
Versions: V15.03.06.23_multi
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the AC6 V2.0 model with the specified firmware; other versions or models may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution allowing full compromise of the router, enabling attackers to intercept traffic, modify settings, or pivot to internal networks.

🟠

Likely Case

Denial of service causing router crashes or instability, disrupting network connectivity for connected devices.

🟢

If Mitigated

Limited impact if the router is isolated or patched, with only minor service interruptions possible.

🌐 Internet-Facing: HIGH, as the vulnerability can be exploited remotely via web interface requests, making exposed routers vulnerable to internet-based attacks.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it if they have network access, but it requires specific targeting.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

A proof-of-concept is available on GitHub, indicating the exploit is straightforward to implement, though weaponization in widespread attacks is not confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Tenda's official website or support for firmware updates; if none, consider workarounds or replacement.

🔧 Temporary Workarounds

Disable MAC Filtering

all

Turn off MAC address filtering in the router settings to prevent exploitation via the vulnerable function.

Access router web interface, navigate to MAC Filter settings, and disable it.

Restrict Access

all

Limit access to the router's admin interface to trusted IP addresses only.

Configure firewall rules on the router to allow admin access from specific IPs.

🧯 If You Can't Patch

  • Isolate the router on a separate network segment to limit potential damage.
  • Monitor network traffic for unusual requests to the router's web interface.

🔍 How to Verify

Check if Vulnerable:

Check the router firmware version via the web interface; if it matches V15.03.06.23_multi, it is vulnerable.

Check Version:

Log into the router web interface and check the firmware version under System Status or similar.

Verify Fix Applied:

Update to a newer firmware version from Tenda and confirm the version has changed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to formSetMacFilterCfg with long parameters in router logs.

Network Indicators:

  • Abnormal traffic patterns to the router's admin port (e.g., port 80/443) with crafted payloads.

SIEM Query:

source="router_logs" AND uri="/goform/setMacFilterCfg" AND (param_length>threshold OR error="buffer overflow")

🔗 References

📤 Share & Export