CVE-2018-25316

CRITICAL

Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change

Title source: cna
STIX 2.1

Description

Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the goform/AdvSetDns endpoint with a crafted admin language cookie to change DNS servers and redirect user traffic to malicious sites.

Exploits (1)

exploitdb WORKING POC
by Todor Donev · textwebappsasp
https://www.exploit-db.com/exploits/44373

References (2)

Core 2
Core References
Exploit exploit
ExploitDB-44373
https://www.exploit-db.com/exploits/44373
Third Party Advisory third-party-advisory
VulnCheck Advisory: Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change
https://www.vulncheck.com/advisories/tenda-w308r-v2-cookie-session-weakness-dns-change

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 13.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-290
Status published
Products (2)
Tenda/R v 5.07.48
Tenda/W 5.07.48
Published Apr 29, 2026
Tracked Since Apr 30, 2026