CVE-2018-25317

CRITICAL

Tenda W3002R/A302/W309R V5.07.64_en Cookie Session Weakness DNS Change

Title source: cna
STIX 2.1

Description

Tenda W3002R/A302/W309R wireless routers version V5.07.64_en contain a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin language cookie to change primary and secondary DNS servers, redirecting user traffic to malicious DNS servers.

Exploits (1)

exploitdb WORKING POC
by Todor Donev · textwebappsasp
https://www.exploit-db.com/exploits/44380

References (2)

Core 2
Core References
Exploit exploit
ExploitDB-44380
https://www.exploit-db.com/exploits/44380
Third Party Advisory third-party-advisory
VulnCheck Advisory: Tenda W3002R/A302/W309R V5.07.64_en Cookie Session Weakness DNS Change
https://www.vulncheck.com/advisories/tenda-w3002r-a302-w309r-64-en-cookie-session-weakness-dns-change

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 13.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-290
Status published
Products (1)
Tenda/W3002R 5.07.64
Published Apr 29, 2026
Tracked Since Apr 30, 2026