Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24322: CWE-304: Missing Critical Step in Authentication in Tenda AC6 V5.0

0
High
VulnerabilityCVE-2025-24322cvecve-2025-24322cwe-304
Published: Wed Aug 20 2025 (08/20/2025, 13:09:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC6 V5.0

Description

An unsafe default authentication vulnerability exists in the Initial Setup Authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted network request can lead to arbitrary code execution. An attacker can browse to the device to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:06:42 UTC

Technical Analysis

CVE-2025-24322 identifies a critical authentication bypass vulnerability in the initial setup authentication mechanism of the Tenda AC6 V5.0 router firmware version V02.03.01.110. The flaw is categorized under CWE-304, indicating a missing critical step in authentication, which results in an unsafe default authentication state. An attacker can exploit this vulnerability remotely over the network by crafting a specific request to the device's setup interface, bypassing authentication controls entirely. This allows arbitrary code execution on the device, potentially enabling full compromise of the router. The vulnerability affects the initial setup phase, which is typically designed to secure the device before normal operation, but due to the missing authentication step, the device is exposed to unauthorized access. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, no privileges or user interaction required, but with high attack complexity. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The vulnerability was published on August 20, 2025, and assigned by Talos. The lack of authentication in the setup process is a critical design flaw that can be leveraged by attackers to gain control over the device and potentially pivot into internal networks.

Potential Impact

For European organizations, this vulnerability poses a significant threat especially to small and medium enterprises and home office environments where Tenda AC6 routers are deployed. Exploitation can lead to complete compromise of the router, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or use the device as a foothold for further attacks within the corporate network. Confidentiality is at risk due to potential data interception; integrity is compromised as attackers can alter configurations or inject malicious code; availability can be disrupted by denial-of-service or device takeover. The vulnerability's network-based attack vector and lack of required privileges mean attackers can exploit it remotely without prior access, increasing the risk of widespread exploitation. The absence of known exploits currently provides a window for mitigation, but the high severity score indicates that once exploited, the damage could be severe. European organizations relying on these devices for critical connectivity or IoT network segmentation could face operational disruptions and data breaches.

Mitigation Recommendations

Immediate mitigation steps include isolating Tenda AC6 V5.0 devices running the vulnerable firmware from untrusted networks, especially the internet, by placing them behind firewalls or network access controls. Network administrators should restrict access to the device’s management interfaces to trusted internal IP ranges only. Monitoring network traffic for unusual requests targeting the setup interface can help detect attempted exploitation. Since no official patch is currently available, organizations should engage with Tenda support channels to obtain firmware updates or advisories. As a longer-term measure, consider replacing vulnerable devices with models from vendors with stronger security track records and timely patch management. Implement network segmentation to limit the impact of a compromised router and enforce strict access controls on critical network segments. Regularly audit device firmware versions and configurations to ensure compliance with security best practices. Educate users about the risks of default or unpatched devices in their home or office environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-03-31T11:05:46.933Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5caffad5a09ad0004fc6a

Added to database: 8/20/2025, 1:17:51 PM

Last enriched: 11/3/2025, 7:06:42 PM

Last updated: 11/30/2025, 6:19:00 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats