Impact
The vulnerability is a cookie session weakness that allows an attacker to send GET requests containing a crafted admin language cookie to the goform/AdvSetDns endpoint. An unauthenticated user can change the DNS servers on the device, redirecting all user traffic to malicious sites. The flaw lies in insufficient session validation, which is identified as CWE-290.
Affected Systems
The affected product is the Tenda W308R v2 router with firmware version 5.07.48. This firmware update exposes the cookie session weakness and can be deployed on Tenda R and W series routers.
Risk and Exploitability
With a CVSS score of 9.3, the vulnerability is considered critical. The EPSS score is not available, and it is not listed in the CISA KEV catalog. The attack vector is unauthenticated over HTTP, requiring only the ability to send crafted GET requests to the device, making it highly exploitable once the device is reachable.
OpenCVE Enrichment