CVE-2025-11121: Command Injection in Tenda AC18
A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-11121 is a command injection vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19. The vulnerability resides in an unknown function associated with the /goform/AdvSetLanip endpoint, where the lanIp parameter is improperly sanitized, allowing an attacker to inject and execute arbitrary system commands remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS v4.0 base score is 5.3, reflecting medium severity due to the partial impact on confidentiality, integrity, and availability, and the lack of privilege requirements. The vulnerability could allow attackers to take control of the router, manipulate network traffic, disrupt services, or pivot into internal networks. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The absence of vendor patches at the time of disclosure necessitates immediate defensive measures to mitigate risk. This vulnerability is particularly concerning for environments where Tenda AC18 devices are deployed as network gateways or in critical infrastructure roles.
Potential Impact
For European organizations, exploitation of CVE-2025-11121 could lead to unauthorized remote control of Tenda AC18 routers, resulting in interception or manipulation of network traffic, disruption of internet connectivity, and potential lateral movement into internal networks. This could compromise sensitive data confidentiality and integrity, degrade service availability, and undermine trust in network infrastructure. Organizations relying on these routers for perimeter defense or VPN termination are especially vulnerable. The medium severity score indicates a moderate but tangible risk, with the potential for significant operational impact if exploited at scale. The public disclosure increases the urgency for European entities to assess their exposure and implement mitigations promptly to prevent exploitation attempts that could disrupt business operations or critical services.
Mitigation Recommendations
1. Immediately inventory and identify all Tenda AC18 routers running firmware version 15.03.05.19 within the organization. 2. Restrict access to the router management interfaces, especially the /goform/AdvSetLanip endpoint, by implementing network segmentation and firewall rules to limit access to trusted administrative networks only. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command injection patterns. 4. Disable remote management features on the affected devices if not strictly necessary. 5. Apply vendor-supplied patches or firmware updates as soon as they become available. 6. If patches are unavailable, consider replacing vulnerable devices or deploying compensating controls such as intrusion prevention systems (IPS) that can detect and block command injection attempts. 7. Educate network administrators about the vulnerability and the importance of timely patching and access control. 8. Regularly review router configurations and logs for signs of compromise or exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11121: Command Injection in Tenda AC18
Description
A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11121 is a command injection vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19. The vulnerability resides in an unknown function associated with the /goform/AdvSetLanip endpoint, where the lanIp parameter is improperly sanitized, allowing an attacker to inject and execute arbitrary system commands remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS v4.0 base score is 5.3, reflecting medium severity due to the partial impact on confidentiality, integrity, and availability, and the lack of privilege requirements. The vulnerability could allow attackers to take control of the router, manipulate network traffic, disrupt services, or pivot into internal networks. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The absence of vendor patches at the time of disclosure necessitates immediate defensive measures to mitigate risk. This vulnerability is particularly concerning for environments where Tenda AC18 devices are deployed as network gateways or in critical infrastructure roles.
Potential Impact
For European organizations, exploitation of CVE-2025-11121 could lead to unauthorized remote control of Tenda AC18 routers, resulting in interception or manipulation of network traffic, disruption of internet connectivity, and potential lateral movement into internal networks. This could compromise sensitive data confidentiality and integrity, degrade service availability, and undermine trust in network infrastructure. Organizations relying on these routers for perimeter defense or VPN termination are especially vulnerable. The medium severity score indicates a moderate but tangible risk, with the potential for significant operational impact if exploited at scale. The public disclosure increases the urgency for European entities to assess their exposure and implement mitigations promptly to prevent exploitation attempts that could disrupt business operations or critical services.
Mitigation Recommendations
1. Immediately inventory and identify all Tenda AC18 routers running firmware version 15.03.05.19 within the organization. 2. Restrict access to the router management interfaces, especially the /goform/AdvSetLanip endpoint, by implementing network segmentation and firewall rules to limit access to trusted administrative networks only. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command injection patterns. 4. Disable remote management features on the affected devices if not strictly necessary. 5. Apply vendor-supplied patches or firmware updates as soon as they become available. 6. If patches are unavailable, consider replacing vulnerable devices or deploying compensating controls such as intrusion prevention systems (IPS) that can detect and block command injection attempts. 7. Educate network administrators about the vulnerability and the importance of timely patching and access control. 8. Regularly review router configurations and logs for signs of compromise or exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T17:51:31.793Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d9ce3549cfd472f579502c
Added to database: 9/29/2025, 12:09:25 AM
Last enriched: 10/6/2025, 12:39:59 AM
Last updated: 10/6/2025, 9:50:34 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
6th October – Threat Intelligence Report
Medium$4.5 Million Offered in New Cloud Hacking Competition
MediumCVE-2025-11330: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-0609: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Logo Software Inc. Logo Cloud
MediumCVE-2025-0608: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Logo Software Inc. Logo Cloud
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.