CVE-2025-57215

Tenda · Tenda AC10 v4

**A high-severity vulnerability in the Tenda AC10 v4 router could allow a remote attacker to compromise the device, potentially leading to network traffic interception or denial of service.**.

Executive summary

A high-severity vulnerability in the Tenda AC10 v4 router could allow a remote attacker to compromise the device, potentially leading to network traffic interception or denial of service.

Vulnerability

The available information does not specify the type of vulnerability. Common high-severity flaws in routers include remote code execution via the web interface, authentication bypass, or command injection. An attacker on the local or adjacent network is likely required for exploitation.

Business impact

With a CVSS score of 7.5 (High), a compromise of a network router can have a severe impact. An attacker could gain control of the device to monitor all network traffic passing through it, redirect users to malicious websites (DNS hijacking), launch attacks against other devices on the network, or create a complete denial of service for internet access.

Remediation

Immediate Action: Update the firmware of the Tenda AC10 v4 router to the latest version provided by the manufacturer. This is the primary method to remediate the vulnerability.

Proactive Monitoring: Monitor router logs for unusual activity, such as unexpected reboots, configuration changes, or outbound connections from the router itself. Monitor network traffic for signs of DNS hijacking or man-in-the-middle attacks.

Compensating Controls: Ensure the router's administrative interface is not exposed to the internet. Change the default administrative password to a strong, unique password. Disable Universal Plug and Play (UPnP) if not required.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The security of network gateway devices like the Tenda AC10 is critical for the safety of the entire local network. This high-severity vulnerability must be addressed immediately by updating the device's firmware to prevent a potential network-level compromise.