CVE-2018-25317
CRITICALTenda W3002R/A302/W309R V5.07.64_en Cookie Session Weakness DNS Change
Title source: cnaDescription
Tenda W3002R/A302/W309R wireless routers version V5.07.64_en contain a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin language cookie to change primary and secondary DNS servers, redirecting user traffic to malicious DNS servers.
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory third-party-advisory
VulnCheck Advisory: Tenda W3002R/A302/W309R V5.07.64_en Cookie Session Weakness DNS Change
https://www.vulncheck.com/advisories/tenda-w3002r-a302-w309r-64-en-cookie-session-weakness-dns-change
Scores
CVSS v3
9.8
EPSS
0.0004
EPSS Percentile
13.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-290
Status
published
Products (1)
Tenda/W3002R
5.07.64
Published
Apr 29, 2026
Tracked Since
Apr 30, 2026