CVE-2025-13258

Tenda · Tenda AC20

A high-severity vulnerability has been identified in Tenda AC20 routers, allowing an unauthenticated attacker to remotely execute arbitrary code and gain full control of the device.

Executive summary

A high-severity vulnerability has been identified in Tenda AC20 routers, allowing an unauthenticated attacker to remotely execute arbitrary code and gain full control of the device. Successful exploitation could lead to a complete compromise of the network perimeter, enabling attackers to intercept sensitive data, attack other internal systems, or incorporate the device into a botnet. Immediate patching is critical to mitigate the significant risk to network security.

Vulnerability

The vulnerability is a remote command injection flaw in the web management interface of the Tenda AC20 router. An unauthenticated attacker on the same network segment can send a specially crafted HTTP POST request to a specific administrative endpoint. The device fails to properly sanitize user-supplied input within a particular parameter, allowing the injection and execution of arbitrary operating system commands with root-level privileges on the device.

Business impact

This vulnerability presents a significant risk to the organization, reflected by its High severity rating with a CVSS score of 8.8. An attacker who successfully exploits this flaw can gain complete control over the affected network device. This could lead to a severe breach of confidentiality, integrity, and availability, including the interception of all network traffic, unauthorized access to internal network resources, deployment of malware, and using the compromised router to launch further attacks against internal or external targets.

Remediation

Immediate Action: Identify all vulnerable Tenda AC20 devices within the environment and apply the latest security updates released by the vendor immediately. After patching, verify that the update was successful and the device is running a fixed firmware version.

Proactive Monitoring: Monitor firewall and web server logs for suspicious requests targeting the router's web management interface, particularly from untrusted sources. Network Intrusion Detection Systems (NIDS) should be configured with signatures to detect potential exploitation attempts. Monitor for unusual outbound traffic from the router, which could indicate a compromise.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the attack surface:

  • Disable remote (WAN) management of the device.
  • Use firewall rules or Access Control Lists (ACLs) to restrict access to the web management interface to only trusted IP addresses or a dedicated management VLAN.
  • Ensure the device is not using default administrative credentials.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical risk of remote code execution on a network perimeter device, this vulnerability must be addressed with the highest priority. Organizations are strongly advised to apply the vendor-supplied patches immediately to all affected Tenda AC20 routers. While this vulnerability is not currently on the CISA KEV list, its severity makes it a prime candidate for future inclusion, and organizations should treat it as an active and critical threat.