CVE-2018-25318

Tenda · FH303/A300

Tenda FH303/A300 routers contain a session weakness that allows unauthenticated attackers to modify DNS settings via insufficient cookie validation.

Executive summary

A critical session vulnerability in Tenda FH303/A300 routers allows unauthenticated remote attackers to modify DNS settings and redirect network traffic.

Vulnerability

The device fails to properly validate cookies during session management, allowing an unauthenticated attacker to manipulate DNS configurations through the '/goform/AdvSetDns' endpoint.

Business impact

With a CVSS score of 9.8, this vulnerability poses a severe risk to network security, enabling attackers to conduct man-in-the-middle attacks. Users may be silently redirected to malicious websites, leading to compromised credentials and malware infections.

Remediation

Immediate Action: Update the device firmware to the latest version released by Tenda.

Proactive Monitoring: Monitor network traffic for anomalous DNS resolution patterns and verify that DNS settings have not been altered.

Compensating Controls: Restrict administrative access to the router's management interface to local, trusted network segments.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Administrators must prioritize patching this vulnerability to prevent traffic redirection. Where patching is not possible, the device should be isolated or replaced to maintain network integrity.