CVE-2025-63666

9.8 CRITICAL

📋 TL;DR

The Tenda AC15 router firmware exposes password hashes in authentication cookies and uses weak session identifiers, allowing attackers to steal and replay cookies for unauthorized access. This affects Tenda AC15 routers running vulnerable firmware versions. Attackers with network access or ability to execute JavaScript in victim browsers can exploit this.

💻 Affected Systems

Products:
  • Tenda AC15
Versions: v15.03.05.18_multi
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All Tenda AC15 routers running the specified firmware version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router administration, allowing attacker to change configurations, intercept traffic, install malware, or pivot to internal networks.

🟠

Likely Case

Unauthorized access to router admin interface leading to network configuration changes, DNS hijacking, or credential theft.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted access and strong network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could exploit this vulnerability within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the router or ability to run JavaScript in victim's browser. Cookie theft and replay is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Tenda official website for firmware updates. If available, download latest firmware and upload via router admin interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router admin interface

Login to router admin > Advanced > System Tools > Remote Management > Disable

Change default admin credentials

all

Use strong, unique password for router administration

Login to router admin > Advanced > System Tools > Password > Set new strong password

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking access to admin interface
  • Implement network segmentation to isolate router management traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status > Firmware Version. If version is v15.03.05.18_multi, device is vulnerable.

Check Version:

Not applicable - check via router web interface

Verify Fix Applied:

After firmware update, verify version has changed from v15.03.05.18_multi. Test cookie behavior by inspecting authentication cookies for password hash exposure.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from unusual IP
  • Admin interface access from unexpected sources

Network Indicators:

  • Unusual traffic to router admin port (typically 80/443)
  • Cookie replay patterns from multiple IPs

SIEM Query:

source_ip=router_ip AND (url_path CONTAINS "/goform/" OR user_agent CONTAINS "unusual")

🔗 References

📤 Share & Export