Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27129: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Tenda AC6 V5.0

0
Critical
VulnerabilityCVE-2025-27129cvecve-2025-27129cwe-288
Published: Wed Aug 20 2025 (08/20/2025, 13:09:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC6 V5.0

Description

An authentication bypass vulnerability exists in the HTTP authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send packets to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:07:16 UTC

Technical Analysis

CVE-2025-27129 is an authentication bypass vulnerability classified under CWE-288 affecting the Tenda AC6 V5.0 router firmware version V02.03.01.110. The vulnerability resides in the HTTP authentication functionality, where an attacker can craft specific HTTP requests that circumvent the authentication process entirely. This bypass does not require any prior authentication, privileges, or user interaction, making it remotely exploitable over the network. Once authentication is bypassed, the attacker can execute arbitrary code on the router, gaining full control over the device. This can lead to unauthorized configuration changes, interception or redirection of network traffic, installation of persistent malware, or use of the device as a pivot point for further attacks within the network. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. No official patches or firmware updates have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability was reserved in March 2025 and published in August 2025 by Talos. Given the widespread use of Tenda AC6 routers in consumer and small business environments, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected routers, resulting in unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Small and medium enterprises (SMEs) and home office setups relying on Tenda AC6 routers are particularly vulnerable due to the device's role as a network gateway. Attackers could leverage compromised routers to launch further attacks on corporate networks, exfiltrate confidential information, or disrupt business operations. The vulnerability undermines network perimeter security and could facilitate lateral movement within organizational networks. Additionally, the potential for arbitrary code execution raises concerns about persistent backdoors or botnet recruitment. The absence of patches increases the window of exposure, necessitating immediate mitigation efforts. The impact extends beyond individual organizations to ISPs and managed service providers that deploy these routers at customer premises, potentially affecting a broad user base across Europe.

Mitigation Recommendations

1. Immediately isolate affected Tenda AC6 V5.0 routers from untrusted networks, especially the internet, by disabling remote management and WAN-side access to the device's HTTP interface. 2. Implement network segmentation to limit the exposure of vulnerable routers to critical internal systems. 3. Monitor network traffic for unusual HTTP requests targeting router management interfaces, using IDS/IPS solutions with custom signatures if possible. 4. Restrict administrative access to the router to trusted IP addresses and use VPNs for remote management where feasible. 5. Regularly audit and update router firmware; although no patch is currently available, monitor Tenda's official channels for updates addressing this vulnerability. 6. Consider replacing vulnerable devices with models from vendors with a stronger security track record if immediate patching is not possible. 7. Educate users and administrators about the risks of this vulnerability and the importance of securing network devices. 8. Employ network-level protections such as firewall rules to block unauthorized access attempts to router management ports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-03-31T11:53:41.160Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5caffad5a09ad0004fc70

Added to database: 8/20/2025, 1:17:51 PM

Last enriched: 11/3/2025, 7:07:16 PM

Last updated: 11/21/2025, 2:08:46 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats