[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2018-25318":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-30T07:23:07.718Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":468,"aliases":483,"duplicate_of":9,"upstream":484,"downstream":485,"duplicates":486,"related":487,"reserved_at":9,"published_at":488,"modified_at":489,"state":490,"summary":491,"references_raw":497,"kevs":508,"epss":9,"epss_history":509,"metrics":510,"affected":522},"CVE-2018-25318","Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin cookie to change DNS servers and redirect user traffic to malicious sites.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-290","Authentication Bypass by Spoofing","This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.","weakness","Incomplete","Base",[19,194,198,202,206,282,286,290,429,433],{"id":20,"name":21,"techniques":22},"CAPEC-21","Exploitation of Trusted Identifiers",[23,140,170],{"id":24,"name":25,"tactics":26,"countermeasures":36},"T1134","Access Token Manipulation",[27,30,33],{"id":28,"name":29},"TA0030","Defense Evasion",{"id":31,"name":32},"TA0005","Stealth",{"id":34,"name":35},"TA0111","Privilege Escalation",[37,42,46,50,55,59,63,67,71,76,80,84,89,94,98,102,106,110,115,119,124,128,132,136],{"id":38,"name":39,"tactic":40},"D3-CI","Configuration Inventory",{"name":41},"Model",{"id":43,"name":44,"tactic":45},"D3-NTPM","Network Traffic Policy Mapping",{"name":41},{"id":47,"name":48,"tactic":49},"D3-AM","Access Modeling",{"name":41},{"id":51,"name":52,"tactic":53},"D3-AEM","Application Exception Monitoring",{"name":54},"Detect",{"id":56,"name":57,"tactic":58},"D3-SCA","System Call Analysis",{"name":54},{"id":60,"name":61,"tactic":62},"D3-CCSA","Credential Compromise Scope Analysis",{"name":54},{"id":64,"name":65,"tactic":66},"D3-OPM","Operational Process Monitoring",{"name":54},{"id":68,"name":69,"tactic":70},"D3-PSA","Process Spawn Analysis",{"name":54},{"id":72,"name":73,"tactic":74},"D3-ST","Session Termination",{"name":75},"Evict",{"id":77,"name":78,"tactic":79},"D3-CR","Credential Revocation",{"name":75},{"id":81,"name":82,"tactic":83},"D3-ANCI","Authentication Cache Invalidation",{"name":75},{"id":85,"name":86,"tactic":87},"D3-DUC","Decoy User Credential",{"name":88},"Deceive",{"id":90,"name":91,"tactic":92},"D3-CH","Credential Hardening",{"name":93},"Harden",{"id":95,"name":96,"tactic":97},"D3-MFA","Multi-factor Authentication",{"name":93},{"id":99,"name":100,"tactic":101},"D3-CRO","Credential Rotation",{"name":93},{"id":103,"name":104,"tactic":105},"D3-TB","Token Binding",{"name":93},{"id":107,"name":108,"tactic":109},"D3-TBA","Token-based Authentication",{"name":93},{"id":111,"name":112,"tactic":113},"D3-RC","Restore Configuration",{"name":114},"Restore",{"id":116,"name":117,"tactic":118},"D3-RIC","Reissue Credential",{"name":114},{"id":120,"name":121,"tactic":122},"D3-SCF","System Call Filtering",{"name":123},"Isolate",{"id":125,"name":126,"tactic":127},"D3-CTS","Credential Transmission Scoping",{"name":123},{"id":129,"name":130,"tactic":131},"D3-EAL","Executable Allowlisting",{"name":123},{"id":133,"name":134,"tactic":135},"D3-EDL","Executable Denylisting",{"name":123},{"id":137,"name":138,"tactic":139},"D3-HBPI","Hardware-based Process Isolation",{"name":123},{"id":141,"name":142,"tactics":143,"countermeasures":147},"T1528","Steal Application Access Token",[144],{"id":145,"name":146},"TA0031","Credential Access",[148,150,152,154,156,158,160,162,164,166,168],{"id":60,"name":61,"tactic":149},{"name":54},{"id":77,"name":78,"tactic":151},{"name":75},{"id":81,"name":82,"tactic":153},{"name":75},{"id":85,"name":86,"tactic":155},{"name":88},{"id":90,"name":91,"tactic":157},{"name":93},{"id":95,"name":96,"tactic":159},{"name":93},{"id":99,"name":100,"tactic":161},{"name":93},{"id":103,"name":104,"tactic":163},{"name":93},{"id":107,"name":108,"tactic":165},{"name":93},{"id":116,"name":117,"tactic":167},{"name":114},{"id":125,"name":126,"tactic":169},{"name":123},{"id":171,"name":172,"tactics":173,"countermeasures":175},"T1539","Steal Web Session Cookie",[174],{"id":145,"name":146},[176,178,180,182,184,186,188,190,192],{"id":60,"name":61,"tactic":177},{"name":54},{"id":77,"name":78,"tactic":179},{"name":75},{"id":81,"name":82,"tactic":181},{"name":75},{"id":85,"name":86,"tactic":183},{"name":88},{"id":90,"name":91,"tactic":185},{"name":93},{"id":95,"name":96,"tactic":187},{"name":93},{"id":99,"name":100,"tactic":189},{"name":93},{"id":116,"name":117,"tactic":191},{"name":114},{"id":125,"name":126,"tactic":193},{"name":123},{"id":195,"name":196,"techniques":197},"CAPEC-22","Exploiting Trust in Client",[],{"id":199,"name":200,"techniques":201},"CAPEC-459","Creating a Rogue Certification Authority Certificate",[],{"id":203,"name":204,"techniques":205},"CAPEC-461","Web Services API Signature Forgery Leveraging Hash Function Extension Weakness",[],{"id":207,"name":208,"techniques":209},"CAPEC-473","Signature Spoof",[210,273],{"id":211,"name":212,"tactics":213,"countermeasures":216},"T1036.001","Invalid Code Signature",[214,215],{"id":28,"name":29},{"id":31,"name":32},[217,221,225,229,233,237,241,245,249,253,257,261,265,269,271],{"id":218,"name":219,"tactic":220},"D3-FA","File Analysis",{"name":54},{"id":222,"name":223,"tactic":224},"D3-FIM","File Integrity Monitoring",{"name":54},{"id":226,"name":227,"tactic":228},"D3-DA","Dynamic Analysis",{"name":54},{"id":230,"name":231,"tactic":232},"D3-EFA","Emulated File Analysis",{"name":54},{"id":234,"name":235,"tactic":236},"D3-FEV","File Eviction",{"name":75},{"id":238,"name":239,"tactic":240},"D3-DF","Decoy File",{"name":88},{"id":242,"name":243,"tactic":244},"D3-FE","File Encryption",{"name":93},{"id":246,"name":247,"tactic":248},"D3-RF","Restore File",{"name":114},{"id":250,"name":251,"tactic":252},"D3-CF","Content Filtering",{"name":123},{"id":254,"name":255,"tactic":256},"D3-LFP","Local File Permissions",{"name":123},{"id":258,"name":259,"tactic":260},"D3-RFAM","Remote File Access Mediation",{"name":123},{"id":262,"name":263,"tactic":264},"D3-CQ","Content Quarantine",{"name":123},{"id":266,"name":267,"tactic":268},"D3-CM","Content Modification",{"name":123},{"id":129,"name":130,"tactic":270},{"name":123},{"id":133,"name":134,"tactic":272},{"name":123},{"id":274,"name":275,"tactics":276,"countermeasures":281},"T1553.002","Code Signing",[277,278],{"id":28,"name":29},{"id":279,"name":280},"TA0112","Defense Impairment",[],{"id":283,"name":284,"techniques":285},"CAPEC-476","Signature Spoofing by Misrepresentation",[],{"id":287,"name":288,"techniques":289},"CAPEC-59","Session Credential Falsification through Prediction",[],{"id":291,"name":292,"techniques":293},"CAPEC-60","Reusing Session IDs (aka Session Replay)",[294,324],{"id":295,"name":296,"tactics":297,"countermeasures":301},"T1134.001","Token Impersonation/Theft",[298,299,300],{"id":28,"name":29},{"id":31,"name":32},{"id":34,"name":35},[302,304,306,308,310,312,314,316,318,320,322],{"id":60,"name":61,"tactic":303},{"name":54},{"id":77,"name":78,"tactic":305},{"name":75},{"id":81,"name":82,"tactic":307},{"name":75},{"id":85,"name":86,"tactic":309},{"name":88},{"id":90,"name":91,"tactic":311},{"name":93},{"id":95,"name":96,"tactic":313},{"name":93},{"id":99,"name":100,"tactic":315},{"name":93},{"id":103,"name":104,"tactic":317},{"name":93},{"id":107,"name":108,"tactic":319},{"name":93},{"id":116,"name":117,"tactic":321},{"name":114},{"id":125,"name":126,"tactic":323},{"name":123},{"id":325,"name":326,"tactics":327,"countermeasures":332},"T1550.004","Web Session Cookie",[328,329],{"id":28,"name":29},{"id":330,"name":331},"TA0109","Lateral Movement",[333,337,341,345,349,353,357,361,365,369,373,375,377,381,385,389,393,395,397,399,401,403,405,407,411,415,417,419,423,427],{"id":334,"name":335,"tactic":336},"D3-UGLPA","User Geolocation Logon Pattern Analysis",{"name":54},{"id":338,"name":339,"tactic":340},"D3-PMAD","Protocol Metadata Anomaly Detection",{"name":54},{"id":342,"name":343,"tactic":344},"D3-CSPP","Client-server Payload Profiling",{"name":54},{"id":346,"name":347,"tactic":348},"D3-PHDURA","Per Host Download-Upload Ratio Analysis",{"name":54},{"id":350,"name":351,"tactic":352},"D3-NTSA","Network Traffic Signature Analysis",{"name":54},{"id":354,"name":355,"tactic":356},"D3-APCA","Application Protocol Command Analysis",{"name":54},{"id":358,"name":359,"tactic":360},"D3-NTCD","Network Traffic Community Deviation",{"name":54},{"id":362,"name":363,"tactic":364},"D3-RTSD","Remote Terminal Session Detection",{"name":54},{"id":366,"name":367,"tactic":368},"D3-PLA","Process Lineage Analysis",{"name":54},{"id":370,"name":371,"tactic":372},"D3-PSMD","Process Self-Modification Detection",{"name":54},{"id":68,"name":69,"tactic":374},{"name":54},{"id":60,"name":61,"tactic":376},{"name":54},{"id":378,"name":379,"tactic":380},"D3-PT","Process Termination",{"name":75},{"id":382,"name":383,"tactic":384},"D3-PS","Process Suspension",{"name":75},{"id":386,"name":387,"tactic":388},"D3-HR","Host Reboot",{"name":75},{"id":390,"name":391,"tactic":392},"D3-HS","Host Shutdown",{"name":75},{"id":77,"name":78,"tactic":394},{"name":75},{"id":81,"name":82,"tactic":396},{"name":75},{"id":85,"name":86,"tactic":398},{"name":88},{"id":90,"name":91,"tactic":400},{"name":93},{"id":95,"name":96,"tactic":402},{"name":93},{"id":99,"name":100,"tactic":404},{"name":93},{"id":116,"name":117,"tactic":406},{"name":114},{"id":408,"name":409,"tactic":410},"D3-NTF","Network Traffic Filtering",{"name":123},{"id":412,"name":413,"tactic":414},"D3-KBPI","Kernel-based Process Isolation",{"name":123},{"id":120,"name":121,"tactic":416},{"name":123},{"id":137,"name":138,"tactic":418},{"name":123},{"id":420,"name":421,"tactic":422},"D3-ABPI","Application-based Process Isolation",{"name":123},{"id":424,"name":425,"tactic":426},"D3-WSAM","Web Session Access Mediation",{"name":123},{"id":125,"name":126,"tactic":428},{"name":123},{"id":430,"name":431,"techniques":432},"CAPEC-667","Bluetooth Impersonation AttackS (BIAS)",[],{"id":434,"name":435,"techniques":436},"CAPEC-94","Adversary in the Middle (AiTM)",[437],{"id":438,"name":439,"tactics":440,"countermeasures":445},"T1557","Adversary-in-the-Middle",[441,442],{"id":145,"name":146},{"id":443,"name":444},"TA0100","Collection",[446,448,450,452,454,456,458,460,462,466],{"id":334,"name":335,"tactic":447},{"name":54},{"id":338,"name":339,"tactic":449},{"name":54},{"id":342,"name":343,"tactic":451},{"name":54},{"id":346,"name":347,"tactic":453},{"name":54},{"id":350,"name":351,"tactic":455},{"name":54},{"id":354,"name":355,"tactic":457},{"name":54},{"id":358,"name":359,"tactic":459},{"name":54},{"id":362,"name":363,"tactic":461},{"name":54},{"id":463,"name":464,"tactic":465},"D3-CAA","Connection Attempt Analysis",{"name":54},{"id":408,"name":409,"tactic":467},{"name":123},[469],{"_key":470,"name":471,"source":472,"url":473,"maturity":474,"reliability_score":475,"verified":476,"type":9,"platforms":477,"requires_auth":9,"exploitdb":479,"metasploit":9},"44381","Tenda FH303/A300 Firmware v5.07.68_EN - Remote DNS Change","exploit-database","https://www.exploit-db.com/exploits/44381","poc",0.5,false,[478],"asp",{"verified":476,"type":480,"platform":478,"file":481,"codes":482},"webapps","exploits/asp/webapps/44381.txt",[],[],[],[],[],[],"2026-04-29T19:24:46.207Z","2026-04-29T19:51:40.636Z","Received",{"cisa_kev":476,"cisa_ransomware":476,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":492,"severity_score":493,"severity_version":494,"severity_source":495,"severity_vector":496,"severity_status":490},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[498,503],{"url":473,"sources":499,"tags":501},[495,500],"nvd",[502],"Exploit",{"url":504,"sources":505,"tags":506},"https://www.vulncheck.com/advisories/tenda-fh303-a300-68-en-cookie-session-weakness-dns-change",[495,500],[507],"Third Party Advisory",[],[],[511,518],{"source":495,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":512,"cvss_v4_0":515},{"baseScore":493,"baseSeverity":513,"vectorString":496,"impactScore":493,"exploitabilityScore":514},"CRITICAL",10,{"baseScore":516,"baseSeverity":513,"vectorString":517,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":500,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":519,"cvss_v4_0":520},{"baseScore":493,"baseSeverity":513,"vectorString":496,"impactScore":493,"exploitabilityScore":514},{"baseScore":516,"baseSeverity":513,"vectorString":521,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[523],{"ecosystem":9,"name":524,"vendor":525,"product":526,"cpe_part":527,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":528},"FH303/A300","tenda","fh303/a300","a",[529],{"version":530,"is_range":476,"range_type":495,"version_start":530,"version_start_type":531,"version_end":530,"version_end_type":531,"fixed_in":9},"5.07.68","including"]