CVE-2025-10815: Buffer Overflow in Tenda AC20
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-10815 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The flaw exists in the HTTP POST request handler component, specifically within the /goform/SetPptpServerCfg endpoint. The vulnerability arises due to unsafe use of the strcpy function when processing the 'startIp' argument, which allows an attacker to overflow the buffer by sending a specially crafted HTTP POST request. This buffer overflow can lead to arbitrary code execution or denial of service conditions on the affected device. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no known exploits are currently observed in the wild, a public exploit is available, making exploitation feasible. The vulnerability affects a widely deployed consumer and small office router model, which is commonly used to provide network connectivity and VPN services via PPTP. Successful exploitation could allow attackers to compromise network infrastructure, intercept or manipulate traffic, and pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home offices that rely on Tenda AC20 routers for network connectivity and VPN access. Exploitation could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the router's role in managing VPN configurations, attackers might manipulate VPN settings to intercept or redirect sensitive communications. The lack of authentication requirement and remote exploitability means attackers can target vulnerable devices exposed to the internet or accessible from less secure network segments. This could impact confidentiality of corporate data, integrity of network configurations, and availability of network services, potentially causing operational disruptions and compliance issues under GDPR and other regulations.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda AC20 devices running affected firmware versions. Since no official patches or updates are referenced, mitigation should include: 1) Disabling remote management interfaces exposed to the internet, especially HTTP POST endpoints related to VPN configuration. 2) Restricting access to router management interfaces via network segmentation and firewall rules to trusted IP addresses only. 3) Monitoring network traffic for unusual POST requests targeting /goform/SetPptpServerCfg and signs of buffer overflow exploitation attempts. 4) If possible, upgrading firmware to a fixed version once released by Tenda. 5) As a temporary measure, disabling PPTP VPN services on the router to reduce attack surface. 6) Employing network intrusion detection systems (NIDS) with signatures for this vulnerability’s exploit patterns. 7) Educating IT staff about the vulnerability and ensuring incident response plans include this threat. These steps go beyond generic advice by focusing on access control, monitoring, and configuration changes specific to the vulnerable component.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10815: Buffer Overflow in Tenda AC20
Description
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10815 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The flaw exists in the HTTP POST request handler component, specifically within the /goform/SetPptpServerCfg endpoint. The vulnerability arises due to unsafe use of the strcpy function when processing the 'startIp' argument, which allows an attacker to overflow the buffer by sending a specially crafted HTTP POST request. This buffer overflow can lead to arbitrary code execution or denial of service conditions on the affected device. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no known exploits are currently observed in the wild, a public exploit is available, making exploitation feasible. The vulnerability affects a widely deployed consumer and small office router model, which is commonly used to provide network connectivity and VPN services via PPTP. Successful exploitation could allow attackers to compromise network infrastructure, intercept or manipulate traffic, and pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home offices that rely on Tenda AC20 routers for network connectivity and VPN access. Exploitation could lead to unauthorized access to internal networks, data exfiltration, disruption of network services, and potential lateral movement to other critical systems. Given the router's role in managing VPN configurations, attackers might manipulate VPN settings to intercept or redirect sensitive communications. The lack of authentication requirement and remote exploitability means attackers can target vulnerable devices exposed to the internet or accessible from less secure network segments. This could impact confidentiality of corporate data, integrity of network configurations, and availability of network services, potentially causing operational disruptions and compliance issues under GDPR and other regulations.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda AC20 devices running affected firmware versions. Since no official patches or updates are referenced, mitigation should include: 1) Disabling remote management interfaces exposed to the internet, especially HTTP POST endpoints related to VPN configuration. 2) Restricting access to router management interfaces via network segmentation and firewall rules to trusted IP addresses only. 3) Monitoring network traffic for unusual POST requests targeting /goform/SetPptpServerCfg and signs of buffer overflow exploitation attempts. 4) If possible, upgrading firmware to a fixed version once released by Tenda. 5) As a temporary measure, disabling PPTP VPN services on the router to reduce attack surface. 6) Employing network intrusion detection systems (NIDS) with signatures for this vulnerability’s exploit patterns. 7) Educating IT staff about the vulnerability and ensuring incident response plans include this threat. These steps go beyond generic advice by focusing on access control, monitoring, and configuration changes specific to the vulnerable component.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T10:22:10.626Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d1bb698864f11789659da4
Added to database: 9/22/2025, 9:11:05 PM
Last enriched: 9/30/2025, 1:20:22 AM
Last updated: 11/3/2025, 12:06:03 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities
HighCVE-2025-48397: CWE-306 Missing Authentication for Critical Function in Eaton Eaton Brightlayer Software Suite (BLSS)
HighCVE-2025-48396: CWE-434 Unrestricted Upload of File with Dangerous Type in Eaton Eaton Brightlayer Software Suite (BLSS)
HighCVE-2025-12623: Authorization Bypass in fushengqian fuint
LowCVE-2025-12622: Buffer Overflow in Tenda AC10
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.