CVE-2025-57215

7.5 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability exists in Tenda AC10 routers running firmware v16.03.10.20. Attackers can exploit this via the get_parentControl_list_Info function to potentially execute arbitrary code or crash the device. This affects users of Tenda AC10 v4.0 hardware with the vulnerable firmware.

💻 Affected Systems

Products:
  • Tenda AC10
Versions: v16.03.10.20
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects AC10 v4.0 hardware models. Other Tenda models or different hardware versions are not confirmed vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to intercept traffic, modify configurations, or use the router as a pivot point into internal networks.

🟠

Likely Case

Device crash causing denial of service, requiring physical reset or firmware reflash to restore functionality.

🟢

If Mitigated

Limited impact if the vulnerable interface is not exposed to untrusted networks and proper network segmentation is in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web management interface function and appears to be remotely exploitable without authentication based on the available technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC10 v4.0. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Wait for automatic reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the vulnerable web interface

Network Segmentation

all

Isolate the router from untrusted networks

🧯 If You Can't Patch

  • Replace the router with a different model that receives security updates
  • Implement strict firewall rules to block all external access to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Access router web interface, navigate to System Tools > System Status, check firmware version matches v16.03.10.20

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After firmware update, verify the version number has changed from v16.03.10.20

📡 Detection & Monitoring

Log Indicators:

  • Repeated connection attempts to /goform/get_parentControl_list_Info
  • Device crash/reboot logs
  • Unusual POST requests with long deviceId parameters

Network Indicators:

  • HTTP POST requests to router IP with oversized deviceId parameter
  • Traffic patterns suggesting buffer overflow exploitation

SIEM Query:

source="router_logs" AND (uri="/goform/get_parentControl_list_Info" OR message="crash" OR message="reboot")

🔗 References

📤 Share & Export