Impact
This vulnerability in Tenda W3002R/A302/W309R routers allows an attacker to modify the device's DNS configuration without authenticating. By sending a crafted GET request to the /goform/AdvSetDns endpoint that includes an admin‑language cookie, an attacker can set any primary or secondary DNS servers. This change can redirect all traffic from the router’s connected clients to malicious DNS servers, enabling phishing, traffic interception, or denial of service attacks.
Affected Systems
The affected devices are Tenda wireless routers model W3002R (and A302/W309R), running firmware version V5.07.64_en. No other firmware versions or models were listed as affected. Therefore, only routers with the V5.07.64_en build should be verified.
Risk and Exploitability
The vulnerability scores a CVSS of 9.3, indicating a high severity. The EPSS score is not available, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers can exploit the weakness remotely over the internet without needing any credentials, using only a crafted HTTP request. Because session validation is insufficient, the exploit requires only a simple GET payload and does not rely on complex prerequisites.
OpenCVE Enrichment