Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11121: Command Injection in Tenda AC18

0
Medium
VulnerabilityCVE-2025-11121cvecve-2025-11121
Published: Sun Sep 28 2025 (09/28/2025, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 10/06/2025, 00:39:59 UTC

Technical Analysis

CVE-2025-11121 is a command injection vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19. The vulnerability resides in an unknown function associated with the /goform/AdvSetLanip endpoint, where the lanIp parameter is improperly sanitized, allowing an attacker to inject and execute arbitrary system commands remotely. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS v4.0 base score is 5.3, reflecting medium severity due to the partial impact on confidentiality, integrity, and availability, and the lack of privilege requirements. The vulnerability could allow attackers to take control of the router, manipulate network traffic, disrupt services, or pivot into internal networks. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The absence of vendor patches at the time of disclosure necessitates immediate defensive measures to mitigate risk. This vulnerability is particularly concerning for environments where Tenda AC18 devices are deployed as network gateways or in critical infrastructure roles.

Potential Impact

For European organizations, exploitation of CVE-2025-11121 could lead to unauthorized remote control of Tenda AC18 routers, resulting in interception or manipulation of network traffic, disruption of internet connectivity, and potential lateral movement into internal networks. This could compromise sensitive data confidentiality and integrity, degrade service availability, and undermine trust in network infrastructure. Organizations relying on these routers for perimeter defense or VPN termination are especially vulnerable. The medium severity score indicates a moderate but tangible risk, with the potential for significant operational impact if exploited at scale. The public disclosure increases the urgency for European entities to assess their exposure and implement mitigations promptly to prevent exploitation attempts that could disrupt business operations or critical services.

Mitigation Recommendations

1. Immediately inventory and identify all Tenda AC18 routers running firmware version 15.03.05.19 within the organization. 2. Restrict access to the router management interfaces, especially the /goform/AdvSetLanip endpoint, by implementing network segmentation and firewall rules to limit access to trusted administrative networks only. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command injection patterns. 4. Disable remote management features on the affected devices if not strictly necessary. 5. Apply vendor-supplied patches or firmware updates as soon as they become available. 6. If patches are unavailable, consider replacing vulnerable devices or deploying compensating controls such as intrusion prevention systems (IPS) that can detect and block command injection attempts. 7. Educate network administrators about the vulnerability and the importance of timely patching and access control. 8. Regularly review router configurations and logs for signs of compromise or exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:51:31.793Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9ce3549cfd472f579502c

Added to database: 9/29/2025, 12:09:25 AM

Last enriched: 10/6/2025, 12:39:59 AM

Last updated: 10/6/2025, 9:50:34 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats