{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/268029#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\n\r\nA command injection vulnerability exists across multiple firmware versions that allows an attacker to execute arbitrary commands as `root` on the affected device. Currently, no solution exists to resolve these vulnerabilities in the Tenda N300 series and Tenda 4G03 Pro devices.\r\n\r\n### Description\r\n\r\nTenda 4G03 Pro is a portable 4G LTE router that is designed  to provide for flexible internet access. It is a plug-and-play device compatible with mobile operators globally, allowing you to insert a SIM card for ad-hoc internet access. Multiple components within this model of Tenda 4G LTE router is impacted by command injection flaws that stem from improper handling of attacker-controlled input passed to internal service functions.\r\n\r\n**CVE-2025-13207**\r\nIn Firmware up to and including v04.03.01.44, manipulation of arguments passed to a function within the service /usr/sbin/httpd can be exploited. A crafted, authenticated HTTP request to TCP port 80 can trigger arbitrary command execution.\r\n\r\n**CVE-2024-24481**\r\nIn Firmware up to and including v04.03.01.14, improper input handling within an accessible function leads to a similar command injection condition. An authenticated attacker can invoke the function through the web interface, after which a crafted network request to TCP port 7329 can result in command execution. This issue is distinct from CVE-2023-2649.\r\n\r\nThese vulnerabilities were identified through reverse engineering of the firmware. At this time, no fixed firmware is available to address these vulnerabilities.\r\n\r\n### Impact\r\n\r\nSuccessful exploitation allows an attacker to execute arbitrary commands as root on the underlying operating system, allowing attacker to take Total control of the device.\r\n\r\n### Solution\r\n\r\nThe CERT/CC is currently unaware of a vendor-supplied patch or mitigation for these vulnerabilities.\r\n\r\n\r\n* **Use an alternative device:** Because no remediation is currently available, users who rely on this device in security-sensitive may consider other devices for such access.\r\n* **Reduce exposure where possible:** If replacement is not immediately feasible, limit usage to reduce risk of abuse.\r\n* **Monitor for vendor updates:** Users should periodically check for firmware updates or advisories from Tenda in case a patch becomes available in the future.\r\n\r\n### Acknowledgements\r\n\r\nThanks to the reporter Ax for reporting this issue. This document was written by Marisa Middler and Timur Snoke.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/268029"},{"url":"https://www.tendacn.com/us/product/4G03Pro","summary":"https://www.tendacn.com/us/product/4G03Pro"}],"title":"Tenda N300 Wi-Fi 4G LTE Router 4G03 Pro impacted by vulnerabilities","tracking":{"current_release_date":"2025-11-20T17:02:10+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#268029","initial_release_date":"2025-11-20 17:02:10.554803+00:00","revision_history":[{"date":"2025-11-20T17:02:10+00:00","number":"1.20251120170210.1","summary":"Released on 2025-11-20T17:02:10+00:00"}],"status":"final","version":"1.20251120170210.1"}},"vulnerabilities":[{"title":"A crafted authenticated HTTP request to port TCP/80 can lead to arbitrary command execution.","notes":[{"category":"summary","text":"A crafted authenticated HTTP request to port TCP/80 can lead to arbitrary command execution."}],"cve":"CVE-2025-13207","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#268029"}]},{"title":"Authenticated HTTP request to start /bin/td_ate and unauthenticated request to TCP/7329 to trigger the command injection.","notes":[{"category":"summary","text":"Authenticated HTTP request to start /bin/td_ate and unauthenticated request to TCP/7329 to trigger the command injection."}],"cve":"CVE-2024-24481","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#268029"}]}],"product_tree":{"branches":[]}}