TopVuln

High-risk vulnerability digests

CVE-2018-25317

  • CRITICAL

disclosure@vulncheck.com

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-04-29 20:16:27
EPSS
0.2% probability · 36.5th percentile — 2026-05-12
Affected versions
Tenda W3002R, A302, W309R v5.07.64_en
Summary
This vulnerability exists in widely deployed consumer Tenda wireless routers. Unauthenticated attackers can exploit insufficient session validation by sending a crafted admin language cookie with GET requests to the /goform/AdvSetDns endpoint. Successful exploitation allows attackers to modify DNS settings and redirect all user traffic from the affected router to malicious DNS servers.
Remediation
Install the latest available firmware update from Tenda for all affected router models. If no official patch is available, disable remote management of the router and restrict admin interface access to trusted local networks only. Monitor DNS configuration for unapproved changes.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.