CVE-2025-60337

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability exists in Tenda AC6 V2.0 routers in the SetSpeedWan function's speed_dir parameter. Attackers can exploit this by sending specially crafted input to cause a Denial of Service (DoS), potentially crashing the router. This affects users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AC6 V2.0
Versions: 15.03.06.50
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other Tenda models or firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, persistent backdoor installation, or permanent device bricking requiring hardware replacement.

🟠

Likely Case

Denial of Service causing router reboot or crash, disrupting network connectivity for all connected devices until manual restart.

🟢

If Mitigated

Limited to temporary service interruption if proper network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub demonstrates DoS exploitation; buffer overflow could potentially be leveraged for code execution with additional effort.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC6 V2.0. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable WAN Management

all

Prevent external access to router management interface to block internet-based attacks.

Network Segmentation

all

Isolate router management interface to trusted internal network segments only.

🧯 If You Can't Patch

  • Replace vulnerable router with updated model or different vendor
  • Implement strict firewall rules blocking all external access to router management ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools.

Check Version:

Login to router web interface and navigate to System Status page.

Verify Fix Applied:

Verify firmware version has changed from 15.03.06.50 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Router crash/reboot logs
  • Unusual traffic to router management interface
  • Failed authentication attempts on admin interface

Network Indicators:

  • Unusual HTTP POST requests to router management endpoints
  • Traffic patterns matching known exploit payloads

SIEM Query:

source="router_logs" AND (event="crash" OR event="reboot") OR http_method="POST" AND uri="/goform/SetSpeedWan"

🔗 References

📤 Share & Export