CVE-2025-5608

8.8 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in Tenda AC18 routers allows remote attackers to execute arbitrary code by manipulating the rebootTime parameter. This affects Tenda AC18 routers running firmware version 15.03.05.05. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: 15.03.05.05
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable by default. The vulnerable endpoint is accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and data exfiltration.

🟠

Likely Case

Router compromise allowing network traffic interception, DNS hijacking, credential theft, and botnet recruitment.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access, though internal threats remain possible.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication, making exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but requires specific targeting.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available, making this easily weaponizable. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. If update available, download and install via router web interface. 3. Reboot router after update. 4. Verify firmware version changed from 15.03.05.05.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Access router admin panel → Advanced Settings → Remote Management → Disable

Network Segmentation

all

Isolate router management interface from untrusted networks

Configure firewall rules to block external access to port 80/443 on router IP

🧯 If You Can't Patch

  • Replace affected router with different model/brand
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Access router web interface → System Status → Firmware Version. Check if version is 15.03.05.05.

Check Version:

curl -s http://router-ip/login/Auth | grep firmware_version

Verify Fix Applied:

After update, verify firmware version is no longer 15.03.05.05. Test if /goform/SetSysAutoRebbotCfg endpoint still accepts malformed rebootTime parameter.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SetSysAutoRebbotCfg
  • Multiple failed reboot attempts
  • Abnormal process creation on router

Network Indicators:

  • Exploit traffic patterns to router port 80/443
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (url="/goform/SetSysAutoRebbotCfg" OR process="malicious_payload")

🔗 References

📤 Share & Export