<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cookie-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cookie-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cookie-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</guid><description>Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.</description><content:encoded><![CDATA[<p>Tenda W308R v2 running firmware V5.07.48 is susceptible to a cookie session weakness (CVE-2018-25316) that enables unauthenticated attackers to perform DNS hijacking. This vulnerability stems from insufficient session validation. An attacker can exploit this weakness by sending specially crafted GET requests to the <code>goform/AdvSetDns</code> endpoint. The malicious request includes a crafted admin language cookie, which bypasses authentication checks and allows modification of the device&rsquo;s DNS server settings. Successful exploitation allows the attacker to redirect the router&rsquo;s DNS queries to a malicious server under their control. This poses a significant risk to end-users, as it can lead to phishing attacks, malware distribution, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda W308R v2 router running firmware V5.07.48 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>goform/AdvSetDns</code> endpoint.</li>
<li>The GET request includes a crafted &ldquo;admin language cookie&rdquo; designed to bypass authentication.</li>
<li>The router receives the malicious GET request and, due to insufficient session validation, incorrectly authenticates the attacker.</li>
<li>The router processes the malicious request, modifying the DNS server settings to attacker-controlled DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker&rsquo;s DNS server redirects users to malicious websites, potentially serving malware or phishing pages.</li>
<li>Users unknowingly interact with the malicious content, leading to data theft, system compromise, or other harmful outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to control DNS resolution for all devices connected to the affected Tenda W308R v2 router. This can lead to widespread redirection to phishing sites designed to steal credentials, or to sites hosting malware that infects user devices. Given the widespread use of Tenda routers, this vulnerability could impact a large number of home and small business networks. A successful attack allows the attacker to perform man-in-the-middle attacks, eavesdrop on network traffic, and compromise connected devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Hijack Attempt</code> to identify attempts to exploit this vulnerability by monitoring for suspicious requests to the <code>/goform/AdvSetDns</code> endpoint (log source: webserver).</li>
<li>Monitor web server logs for requests containing a crafted admin language cookie to the <code>/goform/AdvSetDns</code> endpoint, indicating potential exploitation attempts (log source: webserver).</li>
<li>Apply available patches or firmware updates from Tenda to address the cookie session weakness and prevent unauthorized DNS modifications.</li>
<li>Consider replacing the affected device if a patch is unavailable, especially in high-risk environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25316</category><category>dns-hijacking</category><category>tenda</category><category>cookie-injection</category></item></channel></rss>