CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability classified as critical was found in Tenda AX1803 1.0.0.1. Affected by this vulnerability is the function formSetWifiMacFilterCfg of the file /goform/setWifiFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7598 is a critical stack-based buffer overflow vulnerability in Tenda AX1803 router (version 1.0.0.1) affecting the WiFi MAC filter configuration endpoint. An authenticated remote attacker can exploit improper input validation in the deviceList parameter to achieve remote code execution with full system compromise (confidentiality, integrity, and availability impacts). Public exploit code has been disclosed and the vulnerability may be actively exploited.
Technical Context
The vulnerability exists in the formSetWifiMacFilterCfg function within the /goform/setWifiFilterCfg endpoint of Tenda AX1803 firmware. This is a network device management interface vulnerable to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically a stack-based buffer overflow. The deviceList parameter is passed to a fixed-size stack buffer without proper bounds checking, allowing an attacker to overflow adjacent stack memory including return addresses. Tenda AX1803 is a budget WiFi router running proprietary firmware; the affected endpoint is accessible via HTTP/HTTPS from the LAN management interface. The CPE identifier would be cpe:2.3:h:tenda:ax1803:1.0.0.1:*:*:*:*:*:*:* for the hardware and corresponding firmware component.
Affected Products
[{'vendor': 'Tenda', 'product': 'AX1803', 'affected_versions': ['1.0.0.1'], 'affected_component': 'WiFi MAC Filter Configuration (/goform/setWifiFilterCfg)', 'cpe': 'cpe:2.3:h:tenda:ax1803:1.0.0.1:*:*:*:*:*:*:*', 'device_type': 'Wireless Router (WiFi 6 / 802.11ax)'}]
Remediation
[{'type': 'patch', 'description': "Update Tenda AX1803 firmware to version newer than 1.0.0.1. Check Tenda's official support website (https://www.tenda.com.cn or regional variant) for latest firmware release.", 'priority': 'Critical', 'note': 'Specific patched version not disclosed in public CVE data; contact Tenda support or monitor their security advisories.'}, {'type': 'mitigation', 'description': 'Restrict LAN access to the router management interface (/goform endpoints) via firewall rules. Disable remote management if enabled.', 'priority': 'High'}, {'type': 'mitigation', 'description': 'Enforce strong, unique credentials for router administrative access to reduce likelihood of unauthorized authenticated access.', 'priority': 'High'}, {'type': 'workaround', 'description': 'Isolate Tenda AX1803 from trusted networks containing sensitive systems until patch is available. Consider replacing device with patched alternative if critical deployment.', 'priority': 'Medium'}]
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21338