<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2018-25318 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2018-25318/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2018-25318/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</guid><description>Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.</description><content:encoded><![CDATA[<p>CVE-2018-25318 affects Tenda FH303/A300 routers running firmware version V5.07.68_EN. This vulnerability stems from a session weakness related to insufficient cookie validation. An unauthenticated attacker can exploit this flaw to modify the DNS settings of the router. By sending a crafted GET request to the <code>/goform/AdvSetDns</code> endpoint, an attacker can inject a malicious admin cookie. This allows them to overwrite the configured DNS servers, potentially redirecting all network traffic from connected devices through attacker-controlled infrastructure. This can lead to phishing attacks, malware distribution, and other malicious activities. The vulnerability poses a significant risk to home and small office networks using the affected Tenda routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda FH303/A300 router running firmware V5.07.68_EN.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a forged admin cookie, bypassing authentication checks due to the session weakness.</li>
<li>The attacker sends the crafted GET request to the router&rsquo;s management interface.</li>
<li>The router, due to insufficient cookie validation, accepts the forged cookie and processes the request.</li>
<li>The request modifies the DNS server settings on the router, replacing the legitimate DNS servers with attacker-controlled DNS servers.</li>
<li>Users connected to the router unknowingly use the attacker&rsquo;s DNS servers for name resolution.</li>
<li>DNS requests are redirected to malicious IPs controlled by the attacker, potentially leading to phishing sites or malware downloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25318 allows an attacker to perform DNS hijacking on affected Tenda routers. This can redirect users to malicious websites designed to steal credentials, distribute malware, or conduct other harmful activities. The vulnerability poses a critical risk to users of the affected routers, as it can compromise their online security and privacy. The CVSS v3.1 base score for this vulnerability is 9.8, highlighting its severity. The number of affected users is dependent on the number of deployed vulnerable devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/AdvSetDns</code> with unusual parameters (Sigma rule: &ldquo;Detect Tenda Router DNS Hijacking Attempt&rdquo;).</li>
<li>If possible, upgrade the router firmware to a version that patches CVE-2018-25318.</li>
<li>Implement network segmentation to limit the impact of compromised devices.</li>
<li>Consider using a reputable DNS service with built-in security features to mitigate the impact of DNS hijacking attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25318</category><category>tenda</category><category>dns-hijacking</category><category>network</category></item></channel></rss>