CVE-2018-25318
Published: 29 April 2026
Summary
CVE-2018-25318 is a critical-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Tenda Fh303 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-23 (Session Authenticity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Protects the authenticity of web sessions by requiring validation of session cookies, directly preventing exploitation of insufficient cookie validation to spoof admin access.
Enforces approved authorizations for accessing sensitive endpoints like DNS configuration, blocking unauthenticated requests with crafted cookies.
Manages authenticators including session cookies by requiring protection against unauthorized modification and proper validation mechanisms.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is an auth bypass in a public-facing router web management interface (/goform/AdvSetDns) allowing unauthenticated DNS config changes via crafted requests.
NVD Description
Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin cookie to change DNS servers…
more
and redirect user traffic to malicious sites.
Deeper analysisAI
CVE-2018-25318 is a session weakness vulnerability in Tenda FH303/A300 firmware version V5.07.68_EN, arising from insufficient cookie validation. This flaw allows unauthenticated attackers to modify DNS settings on affected devices.
Remote attackers with network access can exploit the vulnerability by sending crafted GET requests to the /goform/AdvSetDns endpoint, using a spoofed admin cookie. Successful exploitation enables attackers to alter DNS servers, redirecting user traffic to malicious sites and potentially enabling further attacks like phishing or malware distribution. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity across confidentiality, integrity, and availability impacts, and is associated with CWE-290.
Relevant advisories and resources include an exploit entry on Exploit-DB at https://www.exploit-db.com/exploits/44381 and a Vulncheck advisory at https://www.vulncheck.com/advisories/tenda-fh303-a300-68-en-cookie-session-weakness-dns-change.
Details
- CWE(s)