CVE-2025-12622

was · was Multiple Products

A high-severity vulnerability has been discovered in multiple Tenda products, including the Tenda AC10 router.

Executive summary

A high-severity vulnerability has been discovered in multiple Tenda products, including the Tenda AC10 router. This flaw could allow a remote attacker to execute arbitrary commands on the affected device, granting them complete control. Successful exploitation could lead to network traffic interception, data theft, and the compromise of other devices on the internal network.

Vulnerability

This vulnerability is a command injection flaw in the web-based management interface of the affected devices. An attacker can send a specially crafted HTTP request containing malicious shell commands to a specific administrative endpoint. The input is not properly sanitized, allowing the embedded commands to be executed on the underlying operating system with root-level privileges, giving the attacker full control over the router.

Business impact

This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 8.8. An attacker who successfully exploits this flaw can gain complete control of the network gateway. This could lead to severe consequences, including the interception of sensitive data (e.g., credentials, financial information), redirection of users to malicious websites, and using the compromised device as a pivot point to launch further attacks against the internal network. The integrity, confidentiality, and availability of network services are all at high risk.

Remediation

Immediate Action: Apply the security updates released by the vendor to all affected devices immediately. After patching, monitor for any signs of post-exploitation activity by thoroughly reviewing system and access logs for unusual connections or commands executed prior to the patch.

Proactive Monitoring: Implement enhanced monitoring of network traffic originating from the management interface of affected devices. Look for unusual outbound connections, unexpected configuration changes, or anomalous spikes in traffic. Review web server access logs for suspicious POST requests containing shell commands or special characters (e.g., ;, |, &&) directed at administrative endpoints.

Compensating Controls: If immediate patching is not feasible, implement the following controls:

  • Restrict access to the device's web management interface to a dedicated, trusted administrative network or specific IP addresses.
  • Ensure that remote (WAN-side) administration is disabled.
  • Deploy network segmentation to limit the potential lateral movement of an attacker should the device be compromised.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability requires immediate attention. Organizations must prioritize the deployment of vendor-supplied patches to all affected Tenda devices. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime target for opportunistic attackers. We strongly recommend applying the security updates and implementing the suggested compensating controls without delay to prevent potential network compromise.