Tenda N300 Flaws Allow Attackers to Run Commands as Root

Tenda N300 Flaws Allow Attackers to Run Commands as Root

High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing authenticated attackers to execute arbitrary commands with root privileges on affected devices.

With no patches currently available from the manufacturer, security experts are urging users to consider alternative solutions to protect their networks from potential compromise.

Vulnerable Routers Face Command Injection Threats

The Tenda 4G03 Pro is a portable 4G LTE router designed for flexible internet access worldwide.

Users can insert a SIM card to establish ad hoc internet connectivity, making it popular for mobile and temporary networking solutions across different mobile operators worldwide.

However, security researchers have identified serious flaws stemming from improper handling of attacker-controlled input within the router’s internal service functions.

Two distinct command injection vulnerabilities, tracked as CVE-2025-13207 and CVE-2024-24481, affect multiple firmware versions of these devices.

CVE ID Affected Products Vulnerability Type CVSS Score
CVE-2025-13207 Tenda N300 4G03 Pro (Firmware v04.03.01.44 and earlier) Command Injection 8.8 (High)
CVE-2024-24481 Tenda N300 4G03 Pro (Firmware v04.03.01.14 and earlier) Command Injection 8.8 (High)

The first vulnerability, CVE-2025-13207, impacts firmware versions up to and including v04.03.01.44.

Attackers can exploit this flaw by manipulating arguments passed to a function within the /usr/sbin/httpd service.

A specially crafted authenticated HTTP request sent to TCP port 80 can trigger arbitrary command execution on the device.

The second vulnerability, CVE-2024-24481, affects firmware versions up to and including v04.03.01.14.

This flaw involves improper input handling within an accessible function through the web interface.

After authentication, attackers can invoke the vulnerable function and send a crafted network request to TCP port 7329, resulting in command execution with root privileges.

Security researchers discovered these vulnerabilities through reverse engineering of the router’s firmware, and importantly, this issue is distinct from CVE-2023-2649.

The CERT Coordination Center has confirmed that no vendor-supplied patches or mitigations currently exist to address these critical vulnerabilities in the Tenda N300 series and 4G03 Pro devices.

Successful exploitation grants attackers complete control over the affected device, allowing them to execute any commands as the root user on the underlying operating system.

This level of access enables threat actors to intercept network traffic, modify router configurations, establish persistent backdoors, or use compromised devices as launching points for further attacks on connected networks.

CERT/CC recommends that users in security-sensitive environments consider switching to alternative router devices until Tenda releases firmware updates that address these flaws.

Organizations and individuals who cannot immediately replace their devices should limit device use to reduce exposure and the risk of exploitation.

Users should also regularly monitor Tenda’s official channels for future firmware updates or security advisories that may resolve these vulnerabilities.

The vulnerabilities were reported by security researcher Ax, with documentation prepared by CERT/CC analysts Marisa Middler and Timur Snoke.

The advisory was published on November 20, 2025, as Vulnerability Note VU#268029.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and set GBH as a Preferred Source in Google.



Source link