CVE-2025-60663

7.5 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote attackers to execute arbitrary code or cause denial of service. Attackers can exploit this by sending specially crafted requests to the vulnerable wanMTU parameter. Users of affected Tenda AC18 routers with the vulnerable firmware version are at risk.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: V15.03.05.19
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and persistent backdoor installation.

🟠

Likely Case

Denial of service causing router crashes and network disruption, potentially requiring physical reset.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and external access is restricted.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have network access to the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web management interface parameter and requires no authentication. The provided reference appears to contain exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda's official website for firmware updates. 2. Download the latest firmware for AC18. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and install the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's web interface

Access router admin interface -> Advanced Settings -> Remote Management -> Disable

Network segmentation

all

Isolate the router from critical internal networks

🧯 If You Can't Patch

  • Replace the router with a different model that doesn't have this vulnerability
  • Implement strict firewall rules to block all external access to the router's management interface

🔍 How to Verify

Check if Vulnerable:

Access router admin interface -> System Status -> Firmware Version, check if version is V15.03.05.19

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

After firmware update, verify the version is newer than V15.03.05.19

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/advSetMacMtuWan with large wanMTU values
  • Router crash/reboot logs
  • Unusual traffic patterns to router management interface

Network Indicators:

  • HTTP POST requests to /goform/advSetMacMtuWan with abnormally large parameter values
  • Sudden loss of connectivity to the router

SIEM Query:

source="router_logs" AND (uri_path="/goform/advSetMacMtuWan" AND parameter_size>1000) OR event="router_reboot"

🔗 References

📤 Share & Export