CVE-2018-25316

Tenda · W308R v2

Tenda W308R v2 routers contain a cookie session weakness that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation.

Executive summary

A critical session validation vulnerability in Tenda W308R v2 routers allows unauthenticated attackers to modify DNS settings and intercept network traffic.

Vulnerability

Insufficient validation of administrative cookies allows unauthenticated users to access the '/goform/AdvSetDns' endpoint and change DNS server configurations.

Business impact

The CVSS score of 9.8 highlights the severity of this issue, as it permits attackers to perform transparent traffic interception. This can lead to the theft of sensitive data and the deployment of malicious payloads to all connected clients on the network.

Remediation

Immediate Action: Update the router firmware to the most recent version available from the vendor.

Proactive Monitoring: Regularly audit the router configuration for unauthorized DNS changes and monitor logs for unusual access to management endpoints.

Compensating Controls: Disable remote administrative access and ensure that only authorized devices are connected to the network management segment.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

This vulnerability requires immediate attention for any active deployments. Given the potential for traffic redirection, verifying the integrity of the current DNS settings is a critical first step.