CVE-2025-70651

7.5 HIGH

📋 TL;DR

A stack overflow vulnerability in Tenda AX-1803 routers allows attackers to cause Denial of Service (DoS) by sending specially crafted requests to the SSID parameter. This affects users running Tenda AX-1803 v1.0.0.1 firmware. Attackers can crash the router's web interface or potentially execute arbitrary code.

💻 Affected Systems

Products:
  • Tenda AX-1803
Versions: v1.0.0.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web management interface's form_fast_setting_wifi_set function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, persistent backdoor installation, and network infiltration.

🟠

Likely Case

Denial of Service causing router reboot or web interface crash, disrupting network connectivity.

🟢

If Mitigated

Temporary service interruption with automatic recovery after router reboot.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to the web interface. Public proof-of-concept demonstrates DoS capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda support website for firmware updates
2. Download latest firmware for AX-1803
3. Log into router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router after installation

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to web management interface

Login to router > Advanced > System Tools > Remote Management > Disable

Change Default Credentials

all

Use strong unique passwords to reduce authentication risk

Login to router > Advanced > System Tools > Password > Set strong password

🧯 If You Can't Patch

  • Isolate router on separate VLAN with restricted network access
  • Implement network firewall rules to block unauthorized access to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface: Login > Advanced > System Status > Firmware Version

Check Version:

curl -s http://router-ip/goform/getStatus | grep version

Verify Fix Applied:

Verify firmware version is newer than v1.0.0.1 and test SSID parameter with long input

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unusual long SSID parameter values in HTTP requests
  • Router reboot events

Network Indicators:

  • HTTP POST requests to /goform/fast_setting_wifi_set with oversized SSID parameter
  • Unusual traffic to router management port (typically 80/443)

SIEM Query:

source="router_logs" AND (uri="/goform/fast_setting_wifi_set" AND parameter_length>100) OR event="reboot"

🔗 References

📤 Share & Export