CVE-2025-63834: n/a
A stored cross-site scripting (XSS) vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the ssid parameter of the wireless settings. Remote attackers can inject malicious payloads that execute when any user visits the router's homepage.
AI Analysis
Technical Summary
CVE-2025-63834 is a stored cross-site scripting (XSS) vulnerability identified in the Tenda AC18 router firmware version v15.03.05.05_multi. The vulnerability resides in the handling of the ssid parameter within the wireless settings page of the router's web interface. Specifically, the router fails to properly sanitize or encode user-supplied input in the ssid field, allowing an attacker with low privileges (likely authenticated or with some access to the router's configuration interface) to inject malicious JavaScript payloads. These payloads are stored persistently and executed whenever any user visits the router's homepage, which is typically the router's administrative web interface. The attack vector is remote network-based, requiring the attacker to have network access to the router's management interface. Exploitation requires user interaction in the form of visiting the compromised router homepage, which could be performed by legitimate users or administrators. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal credentials, hijack sessions, or perform unauthorized actions on behalf of the user. There is no direct impact on availability. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector, low attack complexity, low privileges required, user interaction required, and partial confidentiality and integrity impact. No known public exploits or patches are currently available, indicating a window of exposure. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of router management sessions. Attackers exploiting this flaw could execute malicious scripts in the context of the router's web interface, potentially stealing administrative credentials or manipulating router settings. This could lead to unauthorized network configuration changes, interception of network traffic, or pivoting attacks within the internal network. The impact is particularly relevant for small and medium enterprises (SMEs) and home office environments where Tenda AC18 routers are deployed and where router management interfaces may be accessible to multiple users or insufficiently secured. While the vulnerability does not directly affect availability, the compromise of router settings could indirectly disrupt network operations. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. European organizations with remote or local network access to these routers should consider this a significant security concern, especially in sectors with sensitive data or critical infrastructure.
Mitigation Recommendations
1. Immediately restrict access to the router's web management interface by limiting it to trusted IP addresses or disabling remote management if not needed. 2. Enforce strong authentication mechanisms for router access, including complex passwords and, if supported, multi-factor authentication. 3. Monitor router logs and network traffic for unusual activity that could indicate exploitation attempts. 4. Educate users and administrators to avoid visiting the router's web interface from untrusted devices or networks. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. If possible, replace vulnerable Tenda AC18 routers with models that have confirmed security updates or better security track records. 7. Implement network segmentation to isolate router management interfaces from general user networks. 8. Use web application firewalls or network intrusion detection systems to detect and block suspicious payloads targeting the router interface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63834: n/a
Description
A stored cross-site scripting (XSS) vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the ssid parameter of the wireless settings. Remote attackers can inject malicious payloads that execute when any user visits the router's homepage.
AI-Powered Analysis
Technical Analysis
CVE-2025-63834 is a stored cross-site scripting (XSS) vulnerability identified in the Tenda AC18 router firmware version v15.03.05.05_multi. The vulnerability resides in the handling of the ssid parameter within the wireless settings page of the router's web interface. Specifically, the router fails to properly sanitize or encode user-supplied input in the ssid field, allowing an attacker with low privileges (likely authenticated or with some access to the router's configuration interface) to inject malicious JavaScript payloads. These payloads are stored persistently and executed whenever any user visits the router's homepage, which is typically the router's administrative web interface. The attack vector is remote network-based, requiring the attacker to have network access to the router's management interface. Exploitation requires user interaction in the form of visiting the compromised router homepage, which could be performed by legitimate users or administrators. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal credentials, hijack sessions, or perform unauthorized actions on behalf of the user. There is no direct impact on availability. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector, low attack complexity, low privileges required, user interaction required, and partial confidentiality and integrity impact. No known public exploits or patches are currently available, indicating a window of exposure. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of router management sessions. Attackers exploiting this flaw could execute malicious scripts in the context of the router's web interface, potentially stealing administrative credentials or manipulating router settings. This could lead to unauthorized network configuration changes, interception of network traffic, or pivoting attacks within the internal network. The impact is particularly relevant for small and medium enterprises (SMEs) and home office environments where Tenda AC18 routers are deployed and where router management interfaces may be accessible to multiple users or insufficiently secured. While the vulnerability does not directly affect availability, the compromise of router settings could indirectly disrupt network operations. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. European organizations with remote or local network access to these routers should consider this a significant security concern, especially in sectors with sensitive data or critical infrastructure.
Mitigation Recommendations
1. Immediately restrict access to the router's web management interface by limiting it to trusted IP addresses or disabling remote management if not needed. 2. Enforce strong authentication mechanisms for router access, including complex passwords and, if supported, multi-factor authentication. 3. Monitor router logs and network traffic for unusual activity that could indicate exploitation attempts. 4. Educate users and administrators to avoid visiting the router's web interface from untrusted devices or networks. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. If possible, replace vulnerable Tenda AC18 routers with models that have confirmed security updates or better security track records. 7. Implement network segmentation to isolate router management interfaces from general user networks. 8. Use web application firewalls or network intrusion detection systems to detect and block suspicious payloads targeting the router interface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69121b9bc86173478b69b3aa
Added to database: 11/10/2025, 5:06:35 PM
Last enriched: 12/1/2025, 8:22:55 PM
Last updated: 12/23/2025, 4:52:33 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.