Skip to main content

CVE-2025-11123: Stack-based Buffer Overflow in Tenda AC18

High
VulnerabilityCVE-2025-11123cvecve-2025-11123
Published: Sun Sep 28 2025 (09/28/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/28/2025, 22:36:09 UTC

Technical Analysis

CVE-2025-11123 is a high-severity stack-based buffer overflow vulnerability affecting the Tenda AC18 router, specifically version 15.03.05.19. The flaw exists in an unspecified function within the /goform/saveAutoQos endpoint, where manipulation of the 'enable' argument leads to a stack-based buffer overflow condition. This vulnerability can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, allowing an attacker to potentially execute arbitrary code on the device, disrupt router functionality, or gain unauthorized access to network traffic. The exploit has been published, increasing the risk of active exploitation, although no known exploits in the wild have been reported yet. The vulnerability is critical for network security because routers like the Tenda AC18 serve as gateways for home and small office networks, and compromise can lead to widespread network infiltration or denial of service. The lack of a patch link suggests that a fix may not yet be available, emphasizing the urgency for mitigation. The vulnerability's presence in a widely deployed consumer-grade router model raises concerns about the scale of potential impact.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC18 routers, this vulnerability poses a significant risk. Exploitation could lead to unauthorized network access, interception of sensitive communications, and disruption of internet connectivity. Given the router's role as a network gateway, attackers could pivot to internal systems, compromising confidentiality and integrity of organizational data. The high severity and remote exploitability mean attackers can launch attacks without physical access or user interaction, increasing the threat surface. Additionally, compromised routers could be leveraged in botnets or for launching further attacks, affecting broader network stability. European organizations with limited IT security resources may be particularly vulnerable due to delayed patching or lack of awareness. The absence of a patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to prevent exploitation.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda AC18 routers from critical infrastructure and sensitive systems to limit lateral movement in case of compromise. 2. Disable or restrict access to the /goform/saveAutoQos endpoint if possible, through router configuration or firewall rules, to prevent exploitation of the vulnerable function. 3. Monitor network traffic for unusual activity originating from or targeting the router, including unexpected outbound connections or spikes in traffic, which may indicate exploitation attempts. 4. Implement strict access controls on router management interfaces, including changing default credentials and limiting remote management access to trusted IPs only. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable Tenda AC18 devices with models from vendors with a strong security track record if patches are delayed. 7. Educate users and IT staff about the vulnerability and signs of compromise to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:51:40.561Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9b83dc6b35b90c30a3ab7

Added to database: 9/28/2025, 10:35:41 PM

Last enriched: 9/28/2025, 10:36:09 PM

Last updated: 9/29/2025, 12:09:23 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats