Skip to main content

CVE-2025-10432: Stack-based Buffer Overflow in Tenda AC1206

Critical
VulnerabilityCVE-2025-10432cvecve-2025-10432
Published: Mon Sep 15 2025 (09/15/2025, 07:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC1206

Description

A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 07:39:28 UTC

Technical Analysis

CVE-2025-10432 is a critical security vulnerability identified in the Tenda AC1206 router, specifically in firmware version 15.03.06.23. The flaw exists in the HTTP Request Handler component, within the function check_param_changed located in the /goform/AdvSetMacMtuWa endpoint. The vulnerability arises from improper handling of the wanMTU parameter, which allows an attacker to perform a stack-based buffer overflow. This type of overflow occurs when data exceeding the buffer's boundary is written onto the stack, potentially overwriting control data such as return addresses. The vulnerability is remotely exploitable without requiring authentication or user interaction, as the HTTP endpoint is accessible over the network. The publicly available exploit code increases the risk of exploitation by threat actors. The CVSS v4.0 score of 9.3 (critical) reflects the high impact on confidentiality, integrity, and availability, with an attack vector that is network-based and requires no privileges or user interaction. Successful exploitation could allow an attacker to execute arbitrary code on the router, leading to full compromise of the device. This could enable attackers to intercept or manipulate network traffic, pivot to internal networks, or disrupt network availability. The absence of an official patch at the time of disclosure further exacerbates the risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Tenda AC1206 routers in their network infrastructure. Compromise of these routers can lead to interception of sensitive communications, unauthorized network access, and potential lateral movement within corporate networks. Given the router’s role as a gateway device, attackers could manipulate routing, DNS settings, or inject malicious payloads into network traffic, impacting confidentiality and integrity of data. Availability could also be affected if the device is crashed or rendered inoperable. Organizations in sectors with high data sensitivity such as finance, healthcare, and critical infrastructure are particularly vulnerable. Additionally, small and medium enterprises (SMEs) that often use consumer-grade routers like the Tenda AC1206 may lack robust network segmentation, increasing exposure. The public availability of exploit code means that even less sophisticated attackers could attempt exploitation, raising the urgency for mitigation. The vulnerability also has implications for home users working remotely, potentially exposing corporate VPNs or remote access solutions connected behind vulnerable routers.

Mitigation Recommendations

Immediate mitigation steps include isolating the affected Tenda AC1206 devices from critical network segments and restricting access to the HTTP management interface from untrusted networks. Network administrators should implement strict firewall rules to block external access to the /goform/AdvSetMacMtuWa endpoint or the router’s management interface entirely. Monitoring network traffic for unusual requests targeting the wanMTU parameter can help detect exploitation attempts. Employing network intrusion detection systems (NIDS) with updated signatures for this CVE is advisable. Organizations should contact Tenda for firmware updates or patches and apply them as soon as they become available. In the absence of patches, consider replacing vulnerable devices with more secure alternatives. Additionally, enforcing network segmentation to limit the router’s exposure and using VPNs or secure tunnels for remote management can reduce risk. Regularly auditing router configurations and disabling unnecessary services or endpoints will further harden the device. Finally, educating IT staff about this vulnerability and ensuring incident response plans include steps for router compromise scenarios is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T10:17:37.510Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7c2949d6d35cc686fb7af

Added to database: 9/15/2025, 7:39:00 AM

Last enriched: 9/15/2025, 7:39:28 AM

Last updated: 9/15/2025, 9:24:30 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats