Skip to main content

CVE-2025-10120: Buffer Overflow in Tenda AC20

High
VulnerabilityCVE-2025-10120cvecve-2025-10120
Published: Tue Sep 09 2025 (09/09/2025, 01:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/09/2025, 02:01:28 UTC

Technical Analysis

CVE-2025-10120 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The vulnerability resides in the strcpy function within the /goform/GetParentControlInfo endpoint, which processes the 'mac' argument. Due to improper bounds checking, an attacker can supply a specially crafted 'mac' parameter that overflows the buffer, potentially overwriting adjacent memory. This flaw can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, as successful exploitation could allow arbitrary code execution or denial of service on the affected device. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability is critical in network infrastructure contexts because routers like the Tenda AC20 serve as gateways for home and small office networks, and compromise could lead to network traffic interception, lateral movement, or persistent footholds. The lack of a patch link suggests that either a fix is pending or not yet publicly available, emphasizing the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC20 routers. Exploitation could lead to unauthorized network access, interception of sensitive data, or disruption of internet connectivity. Given the router's role as a network perimeter device, attackers could pivot into internal networks, compromising additional systems and data. This risk is heightened in sectors with sensitive data such as finance, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged for botnet recruitment or as a launchpad for broader attacks, affecting organizational reputation and compliance with data protection regulations like GDPR. The remote and unauthenticated nature of the exploit increases the threat surface, making it easier for attackers to target vulnerable devices across Europe.

Mitigation Recommendations

Organizations should immediately identify all Tenda AC20 devices running affected firmware versions. Since no official patch link is provided, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators should restrict access to the router's management interfaces by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features, if enabled, will reduce exposure. Employ network segmentation to isolate vulnerable devices from critical systems. Regularly audit network devices for unauthorized changes and monitor logs for suspicious activity related to /goform/GetParentControlInfo requests. Where feasible, replace vulnerable devices with models from vendors providing timely security updates. Additionally, educating users about the risks and encouraging prompt firmware updates once available is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T15:06:42.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf8703d5a2966cfc8533c3

Added to database: 9/9/2025, 1:46:43 AM

Last enriched: 9/9/2025, 2:01:28 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats