CVE-2025-57063

7.5 HIGH

📋 TL;DR

This vulnerability in Tenda G3 routers allows attackers to cause a Denial of Service (DoS) by sending specially crafted requests that trigger a stack overflow in the port mapping functionality. The vulnerability affects Tenda G3 routers running firmware version 3.0br_V15.11.0.17, potentially disrupting network connectivity for affected devices.

💻 Affected Systems

Products:
  • Tenda G3
Versions: 3.0br_V15.11.0.17
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the router. The vulnerability is in the formDelPortMapping function which handles port mapping deletion requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical reboot, persistent network downtime, and potential remote code execution if the overflow can be controlled to execute arbitrary code.

🟠

Likely Case

Router becomes unresponsive, requiring manual reboot to restore functionality, causing temporary network disruption for connected devices.

🟢

If Mitigated

Minimal impact if the router is behind a firewall with restricted access to its management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web interface function and requires sending a crafted HTTP request to the router's management interface. The provided GitHub references contain technical details about the overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check Tenda's official website for firmware updates. 2. If an update is available, download the firmware file. 3. Log into the router's web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Wait for the router to reboot automatically.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the router's web management interface

Restrict Management Interface Access

all

Use firewall rules to limit access to the router's management interface to trusted IP addresses only

🧯 If You Can't Patch

  • Isolate the router on a separate network segment with strict access controls
  • Implement network monitoring to detect exploitation attempts targeting the router's management interface

🔍 How to Verify

Check if Vulnerable:

Check the router's firmware version in the web interface under System Status or System Tools > Firmware Upgrade. If the version is exactly 3.0br_V15.11.0.17, the device is vulnerable.

Check Version:

Connect to router web interface and navigate to System Status page, or use curl: curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After updating firmware, verify the version has changed from 3.0br_V15.11.0.17 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed HTTP POST requests to /goform/delPortMapping
  • Router crash/reboot events in system logs
  • Unusual port mapping deletion attempts

Network Indicators:

  • HTTP POST requests to router IP on port 80/443 with malformed portMappingIndex parameter
  • Sudden loss of connectivity to router management interface

SIEM Query:

source="router_logs" AND (url="/goform/delPortMapping" OR message="portMappingIndex") AND status=200

🔗 References

📤 Share & Export