CVE-2025-9088

Tenda · Tenda AC20 (and potentially other models sharing the same firmware base)

A high-severity vulnerability has been identified in Tenda networking equipment, which could allow an unauthenticated attacker on the local network to gain complete control over the affected device.

Executive summary

A high-severity vulnerability has been identified in Tenda networking equipment, which could allow an unauthenticated attacker on the local network to gain complete control over the affected device. Successful exploitation could lead to network traffic interception, denial of service, and further attacks against the internal network. Organizations are urged to apply vendor-supplied security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a command injection flaw within the web-based management interface of the affected devices. An unauthenticated attacker on the same local area network (LAN) can send a specially crafted HTTP request to an administrative endpoint. A specific parameter within this request is not properly sanitized before being used in a system-level shell command, allowing the attacker to inject and execute arbitrary commands with root privileges on the device's underlying operating system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation grants an attacker complete administrative control over the network device, leading to severe business consequences. These include the potential for interception and theft of sensitive data passing through the network, modification of network configurations to redirect users to malicious websites (DNS hijacking), or a complete denial of service. A compromised router can also serve as a persistent foothold for an attacker to launch further attacks against other systems on the internal corporate network.

Remediation

Immediate Action: Apply the security updates provided by the vendor to all affected devices immediately. Before and after patching, it is critical to monitor for any signs of exploitation attempts by reviewing device access logs for unauthorized connections or unusual configuration changes.

Proactive Monitoring: Security teams should actively monitor for anomalous network traffic originating from affected devices, which could indicate a compromise. Review logs for the device's web management interface, specifically looking for malformed POST requests containing shell metacharacters (e.g., ;, |, &&) in input parameters.

Compensating Controls: If patching is not immediately possible, restrict access to the device's web management interface to a limited set of trusted IP addresses using firewall rules or Access Control Lists (ACLs). Ensure that remote (WAN-side) administration is disabled to limit the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the potential for a complete, unauthenticated takeover of a critical network device, this vulnerability presents a significant risk. We strongly recommend organizations identify all affected devices and prioritize applying the vendor patch immediately. Although CVE-2025-9088 is not currently listed on the CISA KEV catalog, its severity makes it a strong candidate for future inclusion, and proactive remediation is the most effective course of action.