Windows Networking in Public Blocked UDP (17) traffic since I installed wifi range extender

Note: Please do not post Personally Identifiable Information like email address, personal phone number, physical home address, product key etc.

Issue abstract: Norton sabotaging my wifi range extender’s connection, and internet keeps cutting out.

Detailed description: All day today, since I installed my Tenda wifi range extender this morning, Norton’s security history has been producing this activity “Windows Networking in Public Blocked UDP (17) traffic with 192.168.1.111.137” And my internet keeps cutting out. I checked, and the 1.111 device is a known device in our home that is connecting directly with the Starlink base router. Does anyone know how to stop Norton from sabotaging my wifi connection through the new wifi range extender?

Product & version number:

OS details: Windows 11

What is the error message you are seeing? "Windows Networking in Public Blocked UDP (17) traffic with 192.168.1.111.137

If you have any supporting screenshots, please add them:

@BRYARLY_MCEACHERN Disable IPV6 within your router is its not required and do the same on your internet adapters for your devices and reboot.

Tenda, is a brand that is full of issues that are constantly reported in CISA. The company is not quick and in some cases never does address serious vulnerabilities in their products, Make sure the extender firmware is the latest, AND, if its old I would consider removing it from the network for the reasons I stated.

AI Overview

Learn more

Tenda Router Extender Vulnerabilities in 2025

Tenda routers and extenders, like other networking devices, are susceptible to vulnerabilities that could compromise their security and the networks they support. Here’s a summary of vulnerabilities identified in Tenda devices, specifically routers, that were publicly disclosed or assigned CVEs in 2025:

1. Buffer Overflow Vulnerabilities:

  • CVE-2025-29137: Affects Tenda AC7 routers with V1.0 V15.03.06.44 firmware. A buffer overflow in the form_fast_setting_wifi_set function, triggered by an incorrect timeZone parameter, could lead to remote code execution (RCE).
  • CVE-2025-4810: A stack-based buffer overflow in the formSetRebootTimer function of Tenda AC7 routers, caused by improper handling of the reboot_time parameter. This vulnerability can be exploited remotely.
  • CVE-2025-4368: A buffer overflow vulnerability in Tenda AC8, specifically in the formGetRouterStatus function, triggered by manipulating the shareSpeed argument.
  • CVE-2025-4298: A critical vulnerability in Tenda AC1206 (up to 15.03.06.23) affecting the formSetCfm function, leading to buffer overflow through manipulation.
  • CVE-2025-4299: Another critical vulnerability in Tenda AC1206 (up to 15.03.06.23), specifically in the setSchedWifi function, also leading to buffer overflow.
  • CVE-2025-25662: Tenda O4 (V3.0 V1.0.0.10(2936)) is vulnerable to a buffer overflow in the SafeSetMacFilter function due to improper handling of the remark/type/time arguments.
  • CVE-2ree-28221: Tenda W6_S (v1.0.0.4_510) has a buffer overflow in the set_local_time function, potentially causing a web server crash due to the time parameter.
  • CVE-2025-1853: A critical stack-based buffer overflow in Tenda AC8 (16.03.34.06) affecting the sub_49E098 function within the Parameter Handler, exploitable by manipulating the argument list.

2. Other Vulnerabilities:

  • CVE-2024-10434: A critical stack-based buffer overflow in Tenda AC1206 (up to 20241027), affecting the ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 functions. Exploitable remotely through manipulation of the arg argument.
  • CVE-2025-4354: A critical heap-based buffer overflow in Tenda DAP-1520 (1.10B04_BETA02), affecting the set_ws_action function. There’s also a critical stack-based buffer overflow in the same model, affecting the check_dws_cookie

SA

1 Like