CVE-2025-70645
📋 TL;DR
This CVE describes a stack overflow vulnerability in Tenda AX-1806 routers that allows attackers to cause Denial of Service (DoS) by sending specially crafted requests to the deviceList parameter. The vulnerability affects Tenda AX-1806 routers running firmware version 1.0.0.1. Attackers can exploit this remotely to crash the router's web interface or potentially execute arbitrary code.
💻 Affected Systems
- Tenda AX-1806
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, persistent backdoor installation, and network infiltration
Likely Case
Denial of Service causing router reboot or web interface crash, disrupting network connectivity
If Mitigated
Limited impact with proper network segmentation and firewall rules blocking external access to router management interface
🎯 Exploit Status
Proof of concept available in GitHub repository. Exploitation requires sending crafted HTTP POST request to vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check Tenda support website for firmware updates
2. Download latest firmware for AX-1806
3. Log into router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router after installation
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router management interface
Restrict Management Interface Access
allConfigure firewall to only allow management access from trusted IP addresses
🧯 If You Can't Patch
- Segment router management interface to isolated VLAN
- Implement network monitoring for suspicious HTTP requests to router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under System Status or System Tools
Check Version:
curl -s http://router-ip/goform/getStatus | grep version
Verify Fix Applied:
Verify firmware version is updated beyond v1.0.0.1
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP POST requests to /goform/setWifiMacFilterCfg
- Router crash/reboot logs
- Large deviceList parameter values in web logs
Network Indicators:
- HTTP POST requests with oversized deviceList parameter to router management IP
- Multiple connection attempts to router management interface
SIEM Query:
source="router_logs" AND (uri="/goform/setWifiMacFilterCfg" OR message="deviceList") AND bytes>1000