CVE-2025-24322: CWE-304: Missing Critical Step in Authentication in Tenda AC6 V5.0
An unsafe default authentication vulnerability exists in the Initial Setup Authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted network request can lead to arbitrary code execution. An attacker can browse to the device to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2025-24322 identifies a critical authentication bypass vulnerability in the initial setup authentication mechanism of the Tenda AC6 V5.0 router firmware version V02.03.01.110. The flaw is categorized under CWE-304, indicating a missing critical step in authentication, which results in an unsafe default authentication state. An attacker can exploit this vulnerability remotely over the network by crafting a specific request to the device's setup interface, bypassing authentication controls entirely. This allows arbitrary code execution on the device, potentially enabling full compromise of the router. The vulnerability affects the initial setup phase, which is typically designed to secure the device before normal operation, but due to the missing authentication step, the device is exposed to unauthorized access. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, no privileges or user interaction required, but with high attack complexity. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The vulnerability was published on August 20, 2025, and assigned by Talos. The lack of authentication in the setup process is a critical design flaw that can be leveraged by attackers to gain control over the device and potentially pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant threat especially to small and medium enterprises and home office environments where Tenda AC6 routers are deployed. Exploitation can lead to complete compromise of the router, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or use the device as a foothold for further attacks within the corporate network. Confidentiality is at risk due to potential data interception; integrity is compromised as attackers can alter configurations or inject malicious code; availability can be disrupted by denial-of-service or device takeover. The vulnerability's network-based attack vector and lack of required privileges mean attackers can exploit it remotely without prior access, increasing the risk of widespread exploitation. The absence of known exploits currently provides a window for mitigation, but the high severity score indicates that once exploited, the damage could be severe. European organizations relying on these devices for critical connectivity or IoT network segmentation could face operational disruptions and data breaches.
Mitigation Recommendations
Immediate mitigation steps include isolating Tenda AC6 V5.0 devices running the vulnerable firmware from untrusted networks, especially the internet, by placing them behind firewalls or network access controls. Network administrators should restrict access to the device’s management interfaces to trusted internal IP ranges only. Monitoring network traffic for unusual requests targeting the setup interface can help detect attempted exploitation. Since no official patch is currently available, organizations should engage with Tenda support channels to obtain firmware updates or advisories. As a longer-term measure, consider replacing vulnerable devices with models from vendors with stronger security track records and timely patch management. Implement network segmentation to limit the impact of a compromised router and enforce strict access controls on critical network segments. Regularly audit device firmware versions and configurations to ensure compliance with security best practices. Educate users about the risks of default or unpatched devices in their home or office environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-24322: CWE-304: Missing Critical Step in Authentication in Tenda AC6 V5.0
Description
An unsafe default authentication vulnerability exists in the Initial Setup Authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted network request can lead to arbitrary code execution. An attacker can browse to the device to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-24322 identifies a critical authentication bypass vulnerability in the initial setup authentication mechanism of the Tenda AC6 V5.0 router firmware version V02.03.01.110. The flaw is categorized under CWE-304, indicating a missing critical step in authentication, which results in an unsafe default authentication state. An attacker can exploit this vulnerability remotely over the network by crafting a specific request to the device's setup interface, bypassing authentication controls entirely. This allows arbitrary code execution on the device, potentially enabling full compromise of the router. The vulnerability affects the initial setup phase, which is typically designed to secure the device before normal operation, but due to the missing authentication step, the device is exposed to unauthorized access. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, no privileges or user interaction required, but with high attack complexity. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The vulnerability was published on August 20, 2025, and assigned by Talos. The lack of authentication in the setup process is a critical design flaw that can be leveraged by attackers to gain control over the device and potentially pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses a significant threat especially to small and medium enterprises and home office environments where Tenda AC6 routers are deployed. Exploitation can lead to complete compromise of the router, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or use the device as a foothold for further attacks within the corporate network. Confidentiality is at risk due to potential data interception; integrity is compromised as attackers can alter configurations or inject malicious code; availability can be disrupted by denial-of-service or device takeover. The vulnerability's network-based attack vector and lack of required privileges mean attackers can exploit it remotely without prior access, increasing the risk of widespread exploitation. The absence of known exploits currently provides a window for mitigation, but the high severity score indicates that once exploited, the damage could be severe. European organizations relying on these devices for critical connectivity or IoT network segmentation could face operational disruptions and data breaches.
Mitigation Recommendations
Immediate mitigation steps include isolating Tenda AC6 V5.0 devices running the vulnerable firmware from untrusted networks, especially the internet, by placing them behind firewalls or network access controls. Network administrators should restrict access to the device’s management interfaces to trusted internal IP ranges only. Monitoring network traffic for unusual requests targeting the setup interface can help detect attempted exploitation. Since no official patch is currently available, organizations should engage with Tenda support channels to obtain firmware updates or advisories. As a longer-term measure, consider replacing vulnerable devices with models from vendors with stronger security track records and timely patch management. Implement network segmentation to limit the impact of a compromised router and enforce strict access controls on critical network segments. Regularly audit device firmware versions and configurations to ensure compliance with security best practices. Educate users about the risks of default or unpatched devices in their home or office environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2025-03-31T11:05:46.933Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a5caffad5a09ad0004fc6a
Added to database: 8/20/2025, 1:17:51 PM
Last enriched: 11/3/2025, 7:06:42 PM
Last updated: 11/30/2025, 6:19:00 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66433: CWE-863 Incorrect Authorization in wisc HTCondor
MediumCVE-2025-66432: CWE-420 Unprotected Alternate Channel in Oxide Omicron
MediumCVE-2025-13782: SQL Injection in taosir WTCMS
MediumCVE-2025-66424: CWE-863 Incorrect Authorization in Tryton trytond
MediumCVE-2025-66423: CWE-863 Incorrect Authorization in Tryton trytond
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.