Vulnerability Description
Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the goform/AdvSetDns endpoint with a crafted admin language cookie to change DNS servers and redirect user traffic to malicious sites.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | W308R Firmware | 5.07.48 |
| Tenda | W308R | 2.0 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/44373ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/tenda-w308r-v2-cookie-session-weakness-dns-Third Party Advisory
FAQ
What is CVE-2018-25316?
CVE-2018-25316 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send ...
How severe is CVE-2018-25316?
CVE-2018-25316 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-25316?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda W308R Firmware, Tenda W308R.