Skip to main content

CVE-2025-11091: Buffer Overflow in Tenda AC21

High
VulnerabilityCVE-2025-11091cvecve-2025-11091
Published: Sun Sep 28 2025 (09/28/2025, 01:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A security flaw has been discovered in Tenda AC21 up to 16.03.08.16. Affected by this vulnerability is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/28/2025, 02:18:19 UTC

Technical Analysis

CVE-2025-11091 is a high-severity remote buffer overflow vulnerability affecting the Tenda AC21 router firmware versions up to 16.03.08.16. The flaw exists in the sscanf function within the /goform/SetStaticRouteCfg endpoint. Specifically, improper handling and manipulation of the argument list passed to sscanf leads to a buffer overflow condition. This vulnerability can be exploited remotely without authentication or user interaction, allowing an attacker to send specially crafted requests to the affected endpoint. Successful exploitation could enable arbitrary code execution or cause denial of service by crashing the device. Given the nature of the vulnerability, it compromises the confidentiality, integrity, and availability of the router. The CVSS 4.0 base score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploit is currently known in the wild, a proof-of-concept exploit has been released publicly, increasing the risk of active exploitation. The vulnerability affects all firmware versions from 16.03.08.0 through 16.03.08.16, indicating a broad exposure for users who have not updated. The Tenda AC21 is a widely used consumer and small office/home office (SOHO) router model, making this vulnerability relevant for many network environments relying on this device for internet connectivity and routing functions.

Potential Impact

For European organizations, the impact of CVE-2025-11091 can be significant. The Tenda AC21 is commonly deployed in small businesses, home offices, and some branch office environments across Europe due to its cost-effectiveness and feature set. Exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches or man-in-the-middle attacks. Additionally, attackers could leverage the compromised routers as footholds for lateral movement into corporate networks or as part of botnets for further attacks. The disruption of network availability through denial of service could impact business continuity, especially for organizations relying on these routers for critical connectivity. Given the remote exploitability without authentication, attackers can target vulnerable devices over the internet, increasing the risk to organizations with exposed management interfaces. The public availability of exploit code further elevates the threat level, making timely mitigation essential to prevent compromise.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should verify the firmware version of their Tenda AC21 devices and upgrade to a patched version beyond 16.03.08.16 as soon as the vendor releases a fix. If no patch is available yet, consider temporary mitigations. 2. Network segmentation: Isolate vulnerable routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Disable remote management: If remote management interfaces are enabled on the Tenda AC21, disable them or restrict access via firewall rules to trusted IP addresses only. 4. Monitor network traffic: Implement network monitoring to detect unusual traffic patterns or attempts to exploit the /goform/SetStaticRouteCfg endpoint. 5. Replace devices: For high-risk environments, consider replacing vulnerable Tenda AC21 routers with devices from vendors with timely security support. 6. Incident response readiness: Prepare to respond to potential incidents involving router compromise, including forensic analysis and network isolation procedures. 7. Vendor communication: Engage with Tenda support channels to obtain information on patch availability and coordinate updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T05:26:44.839Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d897635d6228f86ddf2d11

Added to database: 9/28/2025, 2:03:15 AM

Last enriched: 9/28/2025, 2:18:19 AM

Last updated: 9/28/2025, 4:57:48 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats