CVE-2025-70650

7.5 HIGH

📋 TL;DR

CVE-2025-70650 is a stack overflow vulnerability in Tenda AX-1806 routers that allows attackers to cause a Denial of Service (DoS) by sending specially crafted requests to the deviceList parameter. This affects all users running Tenda AX-1806 v1.0.0.1 firmware, potentially rendering their routers unresponsive.

💻 Affected Systems

Products:
  • Tenda AX-1806
Versions: v1.0.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration of affected firmware version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router crash requiring physical power cycle, disrupting all network connectivity for connected devices.

🟠

Likely Case

Router becomes unresponsive to legitimate requests, requiring reboot to restore functionality.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted access to management interface.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces exposed.
🏢 Internal Only: MEDIUM - Attackers on local network could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub, exploitation requires sending crafted HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates 2. Download latest firmware 3. Upload via router web interface 4. Reboot router

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Restrict Management Interface Access

all

Configure firewall to only allow management access from trusted IPs

🧯 If You Can't Patch

  • Isolate router on separate VLAN with restricted access
  • Implement network monitoring for DoS attempts against router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface or via SSH if available

Check Version:

Check router web interface at 192.168.0.1 or 192.168.1.1 for firmware version

Verify Fix Applied:

Verify firmware version is updated beyond v1.0.0.1

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed HTTP requests to /goform/setMacFilterCfg
  • Router crash/reboot logs

Network Indicators:

  • Unusual HTTP POST requests to router management interface with large deviceList parameter

SIEM Query:

source="router_logs" AND (uri="/goform/setMacFilterCfg" OR message="crash" OR message="reboot")

🔗 References

📤 Share & Export