CVE-2025-57060

7.5 HIGH

📋 TL;DR

A stack overflow vulnerability exists in Tenda G3 routers in the dns_forward_rule_store function's rules parameter. Attackers can exploit this by sending specially crafted requests to cause a Denial of Service (DoS), potentially crashing the router. This affects users running Tenda G3 routers with vulnerable firmware.

💻 Affected Systems

Products:
  • Tenda G3
Versions: v3.0br_V15.11.0.17
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical reboot, persistent DoS preventing network access, potential remote code execution if stack overflow can be controlled.

🟠

Likely Case

Router becomes unresponsive or reboots, causing temporary network disruption until manual intervention.

🟢

If Mitigated

Minimal impact with proper network segmentation and firewall rules blocking external access to router management.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this vulnerability can be exploited remotely via crafted requests.
🏢 Internal Only: MEDIUM - Internal attackers on the network could exploit this to disrupt network connectivity.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Technical details and proof-of-concept are publicly available in the GitHub reference. Exploitation requires sending crafted requests to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda's official website or support for firmware updates. 2. If available, download the latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable DNS Forwarding Rules

all

Remove or disable DNS forwarding rules if not required, as the vulnerability is in the dns_forward_rule_store function.

Restrict Access to Router Management

linux

Configure firewall rules to block external access to the router's management interface.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate the router on a separate network segment to limit blast radius.
  • Implement network monitoring to detect and block malicious requests targeting the vulnerable function.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface; if it matches v3.0br_V15.11.0.17, it is vulnerable.

Check Version:

Log into router admin interface and navigate to System Status or Firmware Information page.

Verify Fix Applied:

After updating, verify the firmware version has changed from v3.0br_V15.11.0.17 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to DNS forwarding functions
  • Router crash or reboot logs
  • High volume of malformed requests to router management interface

Network Indicators:

  • Spike in traffic to router management ports (80/443)
  • Patterns matching crafted requests to dns_forward_rule_store

SIEM Query:

source="router_logs" AND (message="*dns_forward_rule_store*" OR message="*crash*" OR message="*reboot*")

🔗 References

📤 Share & Export