Skip to main content

CVE-2025-5606: Command Injection in Tenda AC18

Medium
VulnerabilityCVE-2025-5606cvecve-2025-5606
Published: Wed Jun 04 2025 (06/04/2025, 19:00:21 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetIptv of the file /goform/SetIPTVCfg. The manipulation of the argument list leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/06/2025, 18:54:56 UTC

Technical Analysis

CVE-2025-5606 is a command injection vulnerability identified in the Tenda AC18 router, specifically affecting firmware version 15.03.05.05. The flaw resides in the function formSetIptv within the /goform/SetIPTVCfg endpoint. This vulnerability arises due to improper sanitization or validation of input parameters passed to this function, allowing an attacker to manipulate the argument list and inject arbitrary commands. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 5.3 (medium severity) reflects a moderate impact on confidentiality, integrity, and availability, with low complexity for exploitation but requiring low privileges. Although no public exploits are currently known to be in the wild, the disclosure of the exploit code increases the risk of exploitation. Successful exploitation could allow an attacker to execute arbitrary commands on the router, potentially leading to unauthorized control, network traffic interception, or pivoting to internal networks. The vulnerability does not require user interaction but does require low-level privileges, which may be obtained through other means or default credentials. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Tenda AC18 routers in their network infrastructure. Compromise of these routers could lead to unauthorized access to internal networks, interception or manipulation of IPTV streams, and potential lateral movement to critical systems. Given the router's role as a network gateway, exploitation could disrupt availability and confidentiality of communications. Organizations in sectors such as telecommunications, media providers, and enterprises using IPTV services are particularly at risk. The medium severity rating suggests that while the impact is not catastrophic, the ease of remote exploitation without user interaction or authentication makes it a viable attack vector. Additionally, the public disclosure of the exploit code increases the likelihood of opportunistic attacks targeting unpatched devices. This could lead to data breaches, service disruptions, and reputational damage for affected organizations.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AC18 routers running the vulnerable firmware version 15.03.05.05. In the absence of an official patch, the following specific mitigations are recommended: 1) Restrict remote management access to the router by disabling WAN-side administration or limiting access to trusted IP addresses via firewall rules. 2) Change default or weak credentials to strong, unique passwords to reduce the risk of privilege escalation. 3) Monitor network traffic for unusual activity or command execution patterns related to the /goform/SetIPTVCfg endpoint. 4) If possible, segment the network to isolate the router from critical systems to limit potential lateral movement. 5) Engage with Tenda support or vendor channels to obtain firmware updates or advisories. 6) Consider replacing vulnerable devices with models that have confirmed security updates if patching is not feasible. 7) Implement intrusion detection systems (IDS) signatures to detect exploitation attempts targeting this vulnerability. These targeted actions go beyond generic advice by focusing on access control, monitoring, and network segmentation specific to the affected device and vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T10:51:37.220Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68409aec182aa0cae2baf4d2

Added to database: 6/4/2025, 7:13:48 PM

Last enriched: 7/6/2025, 6:54:56 PM

Last updated: 8/17/2025, 4:00:18 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats