CVE-2025-27564
A unencrypted transmission of credentials vulnerability exists in the web portal authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted network packet can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability.
The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.
Tenda AC6 V5.0 V02.03.01.110
AC6 V5.0 - https://www.tendacn.com/product/ac6v5.html
8.8 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-319 - Cleartext Transmission of Sensitive Information
The Tenda AC1200 AC6 is an IPv6 smart wifi router that supports multiple configuration types for home connectivity options. Extremely popular and affordable in online sellers, the Tenda AC1200 AC6 sees large usage in the home-networking space.
The Tenda AC1200 AC6 hosts an HTTP web portal on port 80 to provide online management and administration to the users. After a password is set on the device, trying to access the router via this web portal will provide a login page to the user. An example of the web request used for logging into this portal with the password ‘abc123’ is given below:
GET /index.html HTTP/1
Host: 192.168.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.0.1/login.html
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Priority: u=0, i
password=YWJjMTIz // [1]
As seen at [1], a cleartext password is present within the POST data. Upon decoding the password using base64, we see the following:
$ echo -n 'YWJjMTIz' | base64 -d
abc123
Thus, any attacker who is able to sniff this authentication request is not just provided a replayable hash or any other obfuscated hash, but the actual password in base64 form. This password would then allow the attacker to even flash arbitrary firmware onto the device.
2025-04-29 - Initial Vendor Contact
2025-04-30 - Vendor Disclosure
2025-05-05 - Vendor Feedback Request
2025-05-08 - Vendor Feedback Request
2025-05-12 - Vendor Feedback Request
2025-06-11 - Vendor Feedback Request
2025-07-07 - Feedback Request / Announcement Of Upcoming Release Date
2025-07-23 - Feedback Request / Announcement Of Upcoming Release Date
2025-08-19 - Announcement Of Upcoming Release Date
2025-08-20 - Public Release
Discovered by Lilith >_> of Cisco Talos.