DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2018-25318

Critical
Low Medium High Critical
9.8
CVSS Score
Published: Apr 29, 2026
Last Modified: May 04, 2026

Vulnerability Description

Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin cookie to change DNS servers and redirect user traffic to malicious sites.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

2 configuration(s) from 1 vendor(s)

fh303_firmware
Version:
5.07.68_en
CPE:
cpe:2.3:o:tenda:fh303_firmware:5.07.68_en:*:*:*:*:*:*:*
a300_firmware
Version:
5.07.68_en
CPE:
cpe:2.3:o:tenda:a300_firmware:5.07.68_en:*:*:*:*:*:*:*
This vulnerability affects 2 software configuration(s). Ensure you patch all affected systems.

Severity Details

9.8
out of 10.0
Critical

Weakness Type (CWE)

CWE-290

Authentication Bypass by Spoofing

Description
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
April 29, 2026