<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>W3002R/A302/W309R Wireless Routers — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/w3002r/a302/w309r-wireless-routers/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/w3002r/a302/w309r-wireless-routers/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda Router DNS Hijacking via Cookie Session Weakness</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</guid><description>Tenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.</description><content:encoded><![CDATA[<p>Tenda W3002R, A302, and W309R wireless routers running firmware version V5.07.64_en are susceptible to a cookie session weakness (CVE-2018-25317). This vulnerability allows unauthenticated attackers to remotely modify DNS settings on the affected devices. The attack exploits insufficient session validation, enabling malicious actors to inject commands and redirect user traffic to attacker-controlled DNS servers. This poses a significant risk as it can lead to phishing attacks, malware distribution, and credential theft. Exploitation is straightforward, requiring only a crafted HTTP GET request, making it accessible to unsophisticated attackers. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Tenda router with firmware V5.07.64_en.</li>
<li>The attacker crafts an HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a malicious <code>admin language</code> cookie designed to bypass session validation.</li>
<li>The attacker injects modified DNS server addresses into the GET request parameters (primary DNS and secondary DNS).</li>
<li>The vulnerable router processes the malicious GET request without proper session validation.</li>
<li>The router updates its DNS settings to the attacker-specified DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker can redirect user traffic to malicious websites or intercept sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25317 allows attackers to perform DNS hijacking on vulnerable Tenda routers, potentially affecting all connected users. By controlling the DNS server, attackers can redirect users to phishing sites, distribute malware, or intercept sensitive communications. Given the ease of exploitation, a large number of routers could be compromised, leading to widespread disruption and data theft. The severity is heightened because no authentication is required to change the DNS settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Setting Modification</code> to monitor web server logs for requests to the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>Apply network-level filtering to block connections to known malicious DNS servers based on threat intelligence feeds.</li>
<li>Although no firmware update is available, consider replacing end-of-life Tenda routers (W3002R/A302/W309R with V5.07.64_en) with more secure models.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25317</category><category>dns-hijacking</category><category>router-vulnerability</category></item></channel></rss>