CVE-2025-13400
Tenda · Tenda Multiple Products
A high-severity vulnerability has been identified in multiple Tenda products, notably the Tenda CH22.
Executive summary
A high-severity vulnerability has been identified in multiple Tenda products, notably the Tenda CH22. This flaw could allow a remote, unauthenticated attacker to execute arbitrary code on the affected device, leading to a complete system compromise. Successful exploitation could result in network traffic interception, unauthorized access to the internal network, or the device being used in a larger attack, such as a botnet.
Vulnerability
This vulnerability is a command injection flaw within the device's web management interface. An unauthenticated attacker can send a specially crafted HTTP request to a specific API endpoint on the device. Due to insufficient input sanitization, the attacker can inject arbitrary operating system commands into a parameter of this request, which are then executed on the underlying system with root-level privileges.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the network device. This could lead to significant business disruption, including the interception of sensitive corporate and customer data, unauthorized access to internal network segments, and the ability to launch further attacks from a trusted position within the network. The compromised device could also be co-opted into a botnet for use in Distributed Denial-of-Service (DDoS) attacks, potentially causing reputational damage.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. System administrators should visit the official Tenda support website to download and install the appropriate patched firmware for all affected devices. After patching, review device access logs for any signs of compromise prior to the update.
Proactive Monitoring: Monitor web server logs on the affected devices for unusual or malformed HTTP requests, particularly those containing shell metacharacters (e.g., ;, |, &&, $()). Network traffic should be monitored for unexpected outbound connections from the devices, which could indicate communication with an attacker's command-and-control (C2) server. Enable and centralize logging where possible to retain forensic data.
Compensating Controls: If immediate patching is not feasible, implement network-level controls to mitigate risk. Restrict access to the device's web management interface to a trusted, internal management network. Ensure the management interface is not exposed to the internet. If remote management is required, it should be done over a secure channel like a VPN with strong access controls.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the potential for complete device takeover, this vulnerability poses a significant risk to the organization. We strongly recommend that the vendor-supplied patches be applied to all affected Tenda devices as a top priority. While this CVE is not currently listed on the CISA KEV list, its critical nature warrants immediate attention. Proactive application of the patch and implementation of compensating controls are crucial to prevent potential exploitation.