CVE-2025-10120: Buffer Overflow in Tenda AC20
A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10120 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The vulnerability resides in the strcpy function within the /goform/GetParentControlInfo endpoint, which processes the 'mac' argument. Due to improper bounds checking, an attacker can supply a specially crafted 'mac' parameter that overflows the buffer, potentially overwriting adjacent memory. This flaw can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, as successful exploitation could allow arbitrary code execution or denial of service on the affected device. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability is critical in network infrastructure contexts because routers like the Tenda AC20 serve as gateways for home and small office networks, and compromise could lead to network traffic interception, lateral movement, or persistent footholds. The lack of a patch link suggests that either a fix is pending or not yet publicly available, emphasizing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC20 routers. Exploitation could lead to unauthorized network access, interception of sensitive data, or disruption of internet connectivity. Given the router's role as a network perimeter device, attackers could pivot into internal networks, compromising additional systems and data. This risk is heightened in sectors with sensitive data such as finance, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged for botnet recruitment or as a launchpad for broader attacks, affecting organizational reputation and compliance with data protection regulations like GDPR. The remote and unauthenticated nature of the exploit increases the threat surface, making it easier for attackers to target vulnerable devices across Europe.
Mitigation Recommendations
Organizations should immediately identify all Tenda AC20 devices running affected firmware versions. Since no official patch link is provided, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators should restrict access to the router's management interfaces by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features, if enabled, will reduce exposure. Employ network segmentation to isolate vulnerable devices from critical systems. Regularly audit network devices for unauthorized changes and monitor logs for suspicious activity related to /goform/GetParentControlInfo requests. Where feasible, replace vulnerable devices with models from vendors providing timely security updates. Additionally, educating users about the risks and encouraging prompt firmware updates once available is critical.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10120: Buffer Overflow in Tenda AC20
Description
A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10120 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The vulnerability resides in the strcpy function within the /goform/GetParentControlInfo endpoint, which processes the 'mac' argument. Due to improper bounds checking, an attacker can supply a specially crafted 'mac' parameter that overflows the buffer, potentially overwriting adjacent memory. This flaw can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, as successful exploitation could allow arbitrary code execution or denial of service on the affected device. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability is critical in network infrastructure contexts because routers like the Tenda AC20 serve as gateways for home and small office networks, and compromise could lead to network traffic interception, lateral movement, or persistent footholds. The lack of a patch link suggests that either a fix is pending or not yet publicly available, emphasizing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC20 routers. Exploitation could lead to unauthorized network access, interception of sensitive data, or disruption of internet connectivity. Given the router's role as a network perimeter device, attackers could pivot into internal networks, compromising additional systems and data. This risk is heightened in sectors with sensitive data such as finance, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged for botnet recruitment or as a launchpad for broader attacks, affecting organizational reputation and compliance with data protection regulations like GDPR. The remote and unauthenticated nature of the exploit increases the threat surface, making it easier for attackers to target vulnerable devices across Europe.
Mitigation Recommendations
Organizations should immediately identify all Tenda AC20 devices running affected firmware versions. Since no official patch link is provided, users should monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators should restrict access to the router's management interfaces by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features, if enabled, will reduce exposure. Employ network segmentation to isolate vulnerable devices from critical systems. Regularly audit network devices for unauthorized changes and monitor logs for suspicious activity related to /goform/GetParentControlInfo requests. Where feasible, replace vulnerable devices with models from vendors providing timely security updates. Additionally, educating users about the risks and encouraging prompt firmware updates once available is critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T15:06:42.887Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf8703d5a2966cfc8533c3
Added to database: 9/9/2025, 1:46:43 AM
Last enriched: 9/9/2025, 2:01:28 AM
Last updated: 9/10/2025, 4:07:21 AM
Views: 6
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.