CVE-2025-11091

security · security Multiple Products

A high-severity vulnerability has been identified in certain networking products, allowing a remote, unauthenticated attacker to execute arbitrary code and gain full control of the affected device.

Executive summary

A high-severity vulnerability has been identified in certain networking products, allowing a remote, unauthenticated attacker to execute arbitrary code and gain full control of the affected device. Successful exploitation could lead to a complete network compromise, enabling attackers to intercept sensitive data, pivot to internal networks, or disrupt operations. Immediate patching is required to mitigate the significant risk posed by this flaw.

Vulnerability

The vulnerability is a command injection flaw within the web management interface of the Tenda AC21 router. A specific function, responsible for network diagnostics, fails to properly sanitize user-supplied input before passing it to a system shell command. An unauthenticated attacker can craft a malicious POST request to this function, injecting arbitrary operating system commands which are then executed on the device with root-level privileges, leading to a full system compromise.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the network device, posing a severe risk to the organization. Potential consequences include the ability to monitor, redirect, or modify all network traffic, leading to sensitive data exfiltration (e.g., credentials, financial information). An attacker could also use the compromised device as a pivot point to launch further attacks against the internal corporate network or incorporate the device into a botnet for use in large-scale DDoS attacks, causing significant operational disruption and reputational damage.

Remediation

Immediate Action: Apply vendor-supplied security updates to all affected Tenda AC21 devices immediately. Prioritize patching for devices with management interfaces exposed to the internet. After patching, review system and access logs for any signs of compromise that may have occurred prior to remediation.

Proactive Monitoring: Monitor network traffic for anomalous requests to the device's web management interface, particularly unexpected POST requests to diagnostic endpoints. Security teams should also monitor for unusual outbound connections from the device, which could indicate a successful compromise and communication with a command-and-control server. Enable and centralize logging from network devices to aid in detecting and investigating suspicious activity.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the attack surface:

  • Disable the remote (WAN) management feature on the device.
  • Restrict access to the web management interface to a dedicated, trusted administrative network or specific IP addresses.
  • Use an upstream firewall to block external access to the device's management ports (typically 80/TCP and 443/TCP).

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for complete device takeover, this vulnerability presents a critical risk. We strongly recommend that all affected devices are patched on an emergency basis. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime candidate for future inclusion and an attractive target for opportunistic attackers. Organizations must prioritize the immediate application of vendor patches and implement compensating controls where patching is delayed to prevent a potential network breach.