Note: Please do not post Personally Identifiable Information like email address, personal phone number, physical home address, product key etc.
Issue abstract: Norton sabotaging my wifi range extender’s connection, and internet keeps cutting out.
Detailed description: All day today, since I installed my Tenda wifi range extender this morning, Norton’s security history has been producing this activity “Windows Networking in Public Blocked UDP (17) traffic with 192.168.1.111.137” And my internet keeps cutting out. I checked, and the 1.111 device is a known device in our home that is connecting directly with the Starlink base router. Does anyone know how to stop Norton from sabotaging my wifi connection through the new wifi range extender?
Product & version number:
OS details: Windows 11
What is the error message you are seeing? "Windows Networking in Public Blocked UDP (17) traffic with 192.168.1.111.137
If you have any supporting screenshots, please add them:
@BRYARLY_MCEACHERN Disable IPV6 within your router is its not required and do the same on your internet adapters for your devices and reboot.
Tenda, is a brand that is full of issues that are constantly reported in CISA. The company is not quick and in some cases never does address serious vulnerabilities in their products, Make sure the extender firmware is the latest, AND, if its old I would consider removing it from the network for the reasons I stated.
AI Overview
Learn more
Tenda Router Extender Vulnerabilities in 2025
Tenda routers and extenders, like other networking devices, are susceptible to vulnerabilities that could compromise their security and the networks they support. Here’s a summary of vulnerabilities identified in Tenda devices, specifically routers, that were publicly disclosed or assigned CVEs in 2025:
1. Buffer Overflow Vulnerabilities:
- CVE-2025-29137: Affects Tenda AC7 routers with V1.0 V15.03.06.44 firmware. A buffer overflow in the
form_fast_setting_wifi_set
function, triggered by an incorrect timeZone
parameter, could lead to remote code execution (RCE).
- CVE-2025-4810: A stack-based buffer overflow in the
formSetRebootTimer
function of Tenda AC7 routers, caused by improper handling of the reboot_time
parameter. This vulnerability can be exploited remotely.
- CVE-2025-4368: A buffer overflow vulnerability in Tenda AC8, specifically in the
formGetRouterStatus
function, triggered by manipulating the shareSpeed
argument.
- CVE-2025-4298: A critical vulnerability in Tenda AC1206 (up to 15.03.06.23) affecting the
formSetCfm
function, leading to buffer overflow through manipulation.
- CVE-2025-4299: Another critical vulnerability in Tenda AC1206 (up to 15.03.06.23), specifically in the
setSchedWifi
function, also leading to buffer overflow.
- CVE-2025-25662: Tenda O4 (V3.0 V1.0.0.10(2936)) is vulnerable to a buffer overflow in the
SafeSetMacFilter
function due to improper handling of the remark/type/time
arguments.
- CVE-2ree-28221: Tenda W6_S (v1.0.0.4_510) has a buffer overflow in the
set_local_time
function, potentially causing a web server crash due to the time
parameter.
- CVE-2025-1853: A critical stack-based buffer overflow in Tenda AC8 (16.03.34.06) affecting the
sub_49E098
function within the Parameter Handler, exploitable by manipulating the argument list.
2. Other Vulnerabilities:
- CVE-2024-10434: A critical stack-based buffer overflow in Tenda AC1206 (up to 20241027), affecting the
ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3
functions. Exploitable remotely through manipulation of the arg
argument.
- CVE-2025-4354: A critical heap-based buffer overflow in Tenda DAP-1520 (1.10B04_BETA02), affecting the
set_ws_action
function. There’s also a critical stack-based buffer overflow in the same model, affecting the check_dws_cookie
SA
1 Like