CVE-2025-5900

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in Tenda AC9 routers allows attackers to trick authenticated users into performing unauthorized actions like rebooting or restoring factory settings. It affects users of Tenda AC9 routers with firmware version 15.03.02.13. The attack can be launched remotely through malicious web pages.

💻 Affected Systems

Products:
  • Tenda AC9
Versions: 15.03.02.13
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface. Requires user to be authenticated to router admin panel.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Router becomes unavailable due to repeated reboots or loses all configuration after factory reset, causing network downtime and requiring physical access to reconfigure.

🟠

Likely Case

Temporary network disruption from router reboot or loss of custom settings after factory reset, requiring reconfiguration.

🟢

If Mitigated

No impact if CSRF protections are enabled or if router is not internet-facing.

🌐 Internet-Facing: MEDIUM - Attack requires user interaction but can be delivered via malicious websites.
🏢 Internal Only: LOW - Requires attacker to be on local network and user to visit malicious internal page.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user to visit malicious webpage while logged into router admin. Proof-of-concept available in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

Check Tenda website for firmware updates. If available, download and flash via web interface.

🔧 Temporary Workarounds

Enable CSRF Protection

all

Add CSRF tokens if router firmware supports it (unlikely in affected version)

Logout After Configuration

all

Always log out of router admin interface after making changes

🧯 If You Can't Patch

  • Change router admin password to complex value
  • Disable remote management/WAN access to admin interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin panel > System Status

Check Version:

Login to router web interface and navigate to System Status page

Verify Fix Applied:

Verify firmware version is newer than 15.03.02.13

📡 Detection & Monitoring

Log Indicators:

  • Multiple reboot or factory reset events in short time
  • Admin actions from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to /goform/SysToolReboot or /goform/SysToolRestoreSet without referrer validation

SIEM Query:

source="router" AND (event="reboot" OR event="factory_reset") AND count > 2 within 5m

🔗 References

📤 Share & Export