Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-25316— Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change

CVSS 9.8 · Critical EPSS 0.16% · P37
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-25316

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change
Source: NVD (National Vulnerability Database)
Vulnerability Description
Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the goform/AdvSetDns endpoint with a crafted admin language cookie to change DNS servers and redirect user traffic to malicious sites.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用欺骗进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tenda W308R 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenda W308R是中国腾达(Tenda)公司的一款支持无线网络连接与路由管理功能的家用无线路由器。 Tenda W308R v2 V5.07.48版本存在安全漏洞,该漏洞源于Cookie会话弱点,可能导致未经身份验证的攻击者通过利用会话验证不足修改DNS设置,向goform/AdvSetDns端点发送带有特制admin语言cookie的GET请求以更改DNS服务器并将用户流量重定向到恶意站点。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
TendaW 5.07.48 -
TendaR v 5.07.48 -

II. Public POCs for CVE-2018-25316

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-25316

登录查看更多情报信息。

Same Patch Batch · Tenda · 2026-04-29 · 3 CVEs total

CVE-2018-253179.8 CRITICALTenda W3002R/A302/W309R V5.07.64_en Cookie Session Weakness DNS Change
CVE-2018-253189.8 CRITICALTenda FH303/A300 V5.07.68_EN Cookie Session Weakness DNS Change

IV. Related Vulnerabilities

V. Comments for CVE-2018-25316

No comments yet


Leave a comment