<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dns-Hijacking — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dns-hijacking/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dns-hijacking/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</guid><description>Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.</description><content:encoded><![CDATA[<p>Tenda W308R v2 running firmware V5.07.48 is susceptible to a cookie session weakness (CVE-2018-25316) that enables unauthenticated attackers to perform DNS hijacking. This vulnerability stems from insufficient session validation. An attacker can exploit this weakness by sending specially crafted GET requests to the <code>goform/AdvSetDns</code> endpoint. The malicious request includes a crafted admin language cookie, which bypasses authentication checks and allows modification of the device&rsquo;s DNS server settings. Successful exploitation allows the attacker to redirect the router&rsquo;s DNS queries to a malicious server under their control. This poses a significant risk to end-users, as it can lead to phishing attacks, malware distribution, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda W308R v2 router running firmware V5.07.48 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>goform/AdvSetDns</code> endpoint.</li>
<li>The GET request includes a crafted &ldquo;admin language cookie&rdquo; designed to bypass authentication.</li>
<li>The router receives the malicious GET request and, due to insufficient session validation, incorrectly authenticates the attacker.</li>
<li>The router processes the malicious request, modifying the DNS server settings to attacker-controlled DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker&rsquo;s DNS server redirects users to malicious websites, potentially serving malware or phishing pages.</li>
<li>Users unknowingly interact with the malicious content, leading to data theft, system compromise, or other harmful outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to control DNS resolution for all devices connected to the affected Tenda W308R v2 router. This can lead to widespread redirection to phishing sites designed to steal credentials, or to sites hosting malware that infects user devices. Given the widespread use of Tenda routers, this vulnerability could impact a large number of home and small business networks. A successful attack allows the attacker to perform man-in-the-middle attacks, eavesdrop on network traffic, and compromise connected devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Hijack Attempt</code> to identify attempts to exploit this vulnerability by monitoring for suspicious requests to the <code>/goform/AdvSetDns</code> endpoint (log source: webserver).</li>
<li>Monitor web server logs for requests containing a crafted admin language cookie to the <code>/goform/AdvSetDns</code> endpoint, indicating potential exploitation attempts (log source: webserver).</li>
<li>Apply available patches or firmware updates from Tenda to address the cookie session weakness and prevent unauthorized DNS modifications.</li>
<li>Consider replacing the affected device if a patch is unavailable, especially in high-risk environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25316</category><category>dns-hijacking</category><category>tenda</category><category>cookie-injection</category></item><item><title>Tenda Router DNS Hijacking via Cookie Session Weakness</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</guid><description>Tenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.</description><content:encoded><![CDATA[<p>Tenda W3002R, A302, and W309R wireless routers running firmware version V5.07.64_en are susceptible to a cookie session weakness (CVE-2018-25317). This vulnerability allows unauthenticated attackers to remotely modify DNS settings on the affected devices. The attack exploits insufficient session validation, enabling malicious actors to inject commands and redirect user traffic to attacker-controlled DNS servers. This poses a significant risk as it can lead to phishing attacks, malware distribution, and credential theft. Exploitation is straightforward, requiring only a crafted HTTP GET request, making it accessible to unsophisticated attackers. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Tenda router with firmware V5.07.64_en.</li>
<li>The attacker crafts an HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a malicious <code>admin language</code> cookie designed to bypass session validation.</li>
<li>The attacker injects modified DNS server addresses into the GET request parameters (primary DNS and secondary DNS).</li>
<li>The vulnerable router processes the malicious GET request without proper session validation.</li>
<li>The router updates its DNS settings to the attacker-specified DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker can redirect user traffic to malicious websites or intercept sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25317 allows attackers to perform DNS hijacking on vulnerable Tenda routers, potentially affecting all connected users. By controlling the DNS server, attackers can redirect users to phishing sites, distribute malware, or intercept sensitive communications. Given the ease of exploitation, a large number of routers could be compromised, leading to widespread disruption and data theft. The severity is heightened because no authentication is required to change the DNS settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Setting Modification</code> to monitor web server logs for requests to the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>Apply network-level filtering to block connections to known malicious DNS servers based on threat intelligence feeds.</li>
<li>Although no firmware update is available, consider replacing end-of-life Tenda routers (W3002R/A302/W309R with V5.07.64_en) with more secure models.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25317</category><category>dns-hijacking</category><category>router-vulnerability</category></item><item><title>Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</guid><description>Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.</description><content:encoded><![CDATA[<p>CVE-2018-25318 affects Tenda FH303/A300 routers running firmware version V5.07.68_EN. This vulnerability stems from a session weakness related to insufficient cookie validation. An unauthenticated attacker can exploit this flaw to modify the DNS settings of the router. By sending a crafted GET request to the <code>/goform/AdvSetDns</code> endpoint, an attacker can inject a malicious admin cookie. This allows them to overwrite the configured DNS servers, potentially redirecting all network traffic from connected devices through attacker-controlled infrastructure. This can lead to phishing attacks, malware distribution, and other malicious activities. The vulnerability poses a significant risk to home and small office networks using the affected Tenda routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda FH303/A300 router running firmware V5.07.68_EN.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a forged admin cookie, bypassing authentication checks due to the session weakness.</li>
<li>The attacker sends the crafted GET request to the router&rsquo;s management interface.</li>
<li>The router, due to insufficient cookie validation, accepts the forged cookie and processes the request.</li>
<li>The request modifies the DNS server settings on the router, replacing the legitimate DNS servers with attacker-controlled DNS servers.</li>
<li>Users connected to the router unknowingly use the attacker&rsquo;s DNS servers for name resolution.</li>
<li>DNS requests are redirected to malicious IPs controlled by the attacker, potentially leading to phishing sites or malware downloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25318 allows an attacker to perform DNS hijacking on affected Tenda routers. This can redirect users to malicious websites designed to steal credentials, distribute malware, or conduct other harmful activities. The vulnerability poses a critical risk to users of the affected routers, as it can compromise their online security and privacy. The CVSS v3.1 base score for this vulnerability is 9.8, highlighting its severity. The number of affected users is dependent on the number of deployed vulnerable devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/AdvSetDns</code> with unusual parameters (Sigma rule: &ldquo;Detect Tenda Router DNS Hijacking Attempt&rdquo;).</li>
<li>If possible, upgrade the router firmware to a version that patches CVE-2018-25318.</li>
<li>Implement network segmentation to limit the impact of compromised devices.</li>
<li>Consider using a reputable DNS service with built-in security features to mitigate the impact of DNS hijacking attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25318</category><category>tenda</category><category>dns-hijacking</category><category>network</category></item></channel></rss>