CVE-2025-11324: Stack-based Buffer Overflow in Tenda AC18
A vulnerability was identified in Tenda AC18 15.03.05.19(6318). Affected by this vulnerability is an unknown functionality of the file /goform/setNotUpgrade. Such manipulation of the argument newVersion leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-11324 is a stack-based buffer overflow vulnerability discovered in the Tenda AC18 router firmware version 15.03.05.19(6318). The flaw exists in the handling of the 'newVersion' parameter within the /goform/setNotUpgrade endpoint, which is part of the router's web management interface. When an attacker sends a specially crafted request manipulating this argument, it causes a buffer overflow on the stack, enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no user interaction, and partial privileges required, with high impact on confidentiality, integrity, and availability. Although no active exploitation in the wild has been reported, a public exploit is available, which could facilitate rapid weaponization by threat actors. The vulnerability could allow attackers to take full control of affected devices, potentially pivoting into internal networks, intercepting or manipulating traffic, or launching further attacks. The lack of a vendor patch at the time of publication increases exposure. This vulnerability highlights the risks inherent in embedded device firmware and the critical need for timely updates and secure coding practices in IoT and networking equipment.
Potential Impact
For European organizations, the impact of CVE-2025-11324 is substantial. The Tenda AC18 router is commonly deployed in small office and home office (SOHO) environments, which are often less rigorously secured than enterprise-grade infrastructure. Successful exploitation can lead to complete compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, deploy malware, or establish persistent footholds within corporate or home networks. This can result in data breaches, disruption of business operations, and loss of sensitive information. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially leading to large-scale network outages or botnet recruitment. European organizations relying on Tenda AC18 devices for critical connectivity or remote access are at heightened risk, especially if these devices are exposed to the internet or poorly segmented from internal networks. The vulnerability also poses risks to privacy and regulatory compliance under GDPR, as compromised routers can facilitate unauthorized data access or exfiltration.
Mitigation Recommendations
1. Immediate action should be taken to check for firmware updates from Tenda addressing CVE-2025-11324; apply patches as soon as they become available. 2. Until patches are released, disable remote management interfaces on Tenda AC18 routers to reduce exposure to external attacks. 3. Implement network segmentation to isolate SOHO routers from sensitive internal networks, limiting lateral movement if a device is compromised. 4. Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected requests to /goform/setNotUpgrade. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or exploit attempts. 6. Replace or upgrade vulnerable devices where possible, especially in high-risk environments. 7. Educate users and administrators about the risks of outdated firmware and the importance of timely updates. 8. Restrict access to router management interfaces to trusted IP addresses or VPN connections. 9. Conduct regular security audits of network devices to identify and remediate vulnerabilities proactively.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-11324: Stack-based Buffer Overflow in Tenda AC18
Description
A vulnerability was identified in Tenda AC18 15.03.05.19(6318). Affected by this vulnerability is an unknown functionality of the file /goform/setNotUpgrade. Such manipulation of the argument newVersion leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11324 is a stack-based buffer overflow vulnerability discovered in the Tenda AC18 router firmware version 15.03.05.19(6318). The flaw exists in the handling of the 'newVersion' parameter within the /goform/setNotUpgrade endpoint, which is part of the router's web management interface. When an attacker sends a specially crafted request manipulating this argument, it causes a buffer overflow on the stack, enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no user interaction, and partial privileges required, with high impact on confidentiality, integrity, and availability. Although no active exploitation in the wild has been reported, a public exploit is available, which could facilitate rapid weaponization by threat actors. The vulnerability could allow attackers to take full control of affected devices, potentially pivoting into internal networks, intercepting or manipulating traffic, or launching further attacks. The lack of a vendor patch at the time of publication increases exposure. This vulnerability highlights the risks inherent in embedded device firmware and the critical need for timely updates and secure coding practices in IoT and networking equipment.
Potential Impact
For European organizations, the impact of CVE-2025-11324 is substantial. The Tenda AC18 router is commonly deployed in small office and home office (SOHO) environments, which are often less rigorously secured than enterprise-grade infrastructure. Successful exploitation can lead to complete compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, deploy malware, or establish persistent footholds within corporate or home networks. This can result in data breaches, disruption of business operations, and loss of sensitive information. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially leading to large-scale network outages or botnet recruitment. European organizations relying on Tenda AC18 devices for critical connectivity or remote access are at heightened risk, especially if these devices are exposed to the internet or poorly segmented from internal networks. The vulnerability also poses risks to privacy and regulatory compliance under GDPR, as compromised routers can facilitate unauthorized data access or exfiltration.
Mitigation Recommendations
1. Immediate action should be taken to check for firmware updates from Tenda addressing CVE-2025-11324; apply patches as soon as they become available. 2. Until patches are released, disable remote management interfaces on Tenda AC18 routers to reduce exposure to external attacks. 3. Implement network segmentation to isolate SOHO routers from sensitive internal networks, limiting lateral movement if a device is compromised. 4. Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected requests to /goform/setNotUpgrade. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or exploit attempts. 6. Replace or upgrade vulnerable devices where possible, especially in high-risk environments. 7. Educate users and administrators about the risks of outdated firmware and the importance of timely updates. 8. Restrict access to router management interfaces to trusted IP addresses or VPN connections. 9. Conduct regular security audits of network devices to identify and remediate vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T14:23:01.341Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e366f236c79392d67e7d78
Added to database: 10/6/2025, 6:51:30 AM
Last enriched: 10/6/2025, 7:04:01 AM
Last updated: 10/7/2025, 11:33:40 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11388: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11386: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11385: Buffer Overflow in Tenda AC20
HighCVE-2025-11360: Cross Site Scripting in jakowenko double-take
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.