Skip to main content

CVE-2025-10803: Buffer Overflow in Tenda AC23

High
VulnerabilityCVE-2025-10803cvecve-2025-10803
Published: Mon Sep 22 2025 (09/22/2025, 15:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC23

Description

A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 17:25:00 UTC

Technical Analysis

CVE-2025-10803 is a high-severity buffer overflow vulnerability affecting the Tenda AC23 wireless router firmware versions up to 16.03.07.52. The vulnerability resides in the HTTP POST request handler component, specifically in the /goform/SetPptpServerCfg endpoint. The flaw is caused by improper handling of the 'startIp' argument in the sscanf function, which can be manipulated by an attacker to overflow the buffer. This overflow can lead to arbitrary code execution or denial of service conditions. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed, making it likely that attackers will develop weaponized payloads soon. The vulnerability affects a broad range of firmware versions, indicating that many deployed devices remain vulnerable. Given that Tenda AC23 routers are commonly used in home and small office environments, exploitation could allow attackers to compromise network gateways, intercept or manipulate traffic, and pivot into internal networks.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC23 routers for internet connectivity. Successful exploitation could lead to full compromise of the router, enabling attackers to intercept sensitive communications, inject malicious traffic, or establish persistent backdoors. This threatens confidentiality and integrity of organizational data and can disrupt availability of network services. In sectors with strict data protection regulations such as GDPR, a breach stemming from this vulnerability could result in regulatory penalties and reputational damage. Additionally, compromised routers could be leveraged as part of botnets or for lateral movement within corporate networks, amplifying the threat. The lack of authentication requirement and remote exploitability make it a critical risk for organizations with exposed management interfaces or insufficient network segmentation.

Mitigation Recommendations

Organizations should immediately identify and inventory Tenda AC23 devices within their networks and verify firmware versions. Since no official patches or updates are currently linked, mitigation should focus on reducing exposure: disable remote management interfaces accessible from untrusted networks; restrict access to the /goform/SetPptpServerCfg endpoint via firewall rules or router access control lists; implement network segmentation to isolate vulnerable devices from critical assets; monitor network traffic for unusual POST requests targeting the vulnerable endpoint; and consider replacing affected devices with models from vendors with timely security support. Additionally, organizations should apply strict network perimeter controls and deploy intrusion detection/prevention systems configured to detect exploitation attempts targeting this vulnerability. Regularly check for vendor firmware updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T09:39:45.186Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d18657c1d31cc80230d173

Added to database: 9/22/2025, 5:24:39 PM

Last enriched: 9/22/2025, 5:25:00 PM

Last updated: 9/24/2025, 9:04:03 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats