CVE-2025-11325: Stack-based Buffer Overflow in Tenda AC18
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing a manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
AI Analysis
Technical Summary
CVE-2025-11325 identifies a stack-based buffer overflow vulnerability in the Tenda AC18 router firmware version 15.03.05.19(6318). The vulnerability resides in an unknown internal function accessed via the /goform/fast_setting_pppoe_set endpoint, specifically through the manipulation of the Username parameter. This buffer overflow occurs when the input exceeds the allocated buffer size on the stack, leading to memory corruption. Because the endpoint is remotely accessible and does not require authentication or user interaction, an attacker can exploit this flaw over the network to execute arbitrary code with elevated privileges on the device. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. While no confirmed exploits in the wild have been reported, a public proof-of-concept exploit exists, increasing the likelihood of exploitation. The vulnerability could allow attackers to take full control of affected routers, intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks. The lack of an official patch at the time of disclosure necessitates immediate attention from users and administrators of Tenda AC18 devices.
Potential Impact
The impact of CVE-2025-11325 is significant for organizations and individuals using Tenda AC18 routers. Successful exploitation can lead to full compromise of the device, enabling attackers to execute arbitrary code with elevated privileges. This can result in interception and manipulation of network traffic, loss of confidentiality of sensitive data, disruption of network services, and potential lateral movement within connected networks. For enterprises and small businesses relying on these routers for internet connectivity, this vulnerability poses risks to operational continuity and data security. Additionally, compromised routers can be enlisted into botnets or used as pivot points for further attacks against internal systems. The widespread use of Tenda devices in various regions amplifies the potential scale of impact. Without timely mitigation, attackers can exploit this vulnerability remotely and without authentication, increasing the threat landscape considerably.
Mitigation Recommendations
To mitigate CVE-2025-11325, organizations should immediately check for firmware updates from Tenda addressing this vulnerability and apply them as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router’s management interfaces, especially the /goform/fast_setting_pppoe_set endpoint, by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features or changing default credentials can reduce exposure. Monitoring network traffic for unusual activity or exploitation attempts targeting this endpoint is recommended. Additionally, segmenting the network to isolate vulnerable devices and employing intrusion detection/prevention systems can help detect and prevent exploitation. Users should also consider replacing affected devices with models from vendors with timely security support if patches are not forthcoming. Regular backups and incident response plans should be updated to prepare for potential compromises.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Egypt, South Africa
CVE-2025-11325: Stack-based Buffer Overflow in Tenda AC18
Description
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing a manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11325 identifies a stack-based buffer overflow vulnerability in the Tenda AC18 router firmware version 15.03.05.19(6318). The vulnerability resides in an unknown internal function accessed via the /goform/fast_setting_pppoe_set endpoint, specifically through the manipulation of the Username parameter. This buffer overflow occurs when the input exceeds the allocated buffer size on the stack, leading to memory corruption. Because the endpoint is remotely accessible and does not require authentication or user interaction, an attacker can exploit this flaw over the network to execute arbitrary code with elevated privileges on the device. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. While no confirmed exploits in the wild have been reported, a public proof-of-concept exploit exists, increasing the likelihood of exploitation. The vulnerability could allow attackers to take full control of affected routers, intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks. The lack of an official patch at the time of disclosure necessitates immediate attention from users and administrators of Tenda AC18 devices.
Potential Impact
The impact of CVE-2025-11325 is significant for organizations and individuals using Tenda AC18 routers. Successful exploitation can lead to full compromise of the device, enabling attackers to execute arbitrary code with elevated privileges. This can result in interception and manipulation of network traffic, loss of confidentiality of sensitive data, disruption of network services, and potential lateral movement within connected networks. For enterprises and small businesses relying on these routers for internet connectivity, this vulnerability poses risks to operational continuity and data security. Additionally, compromised routers can be enlisted into botnets or used as pivot points for further attacks against internal systems. The widespread use of Tenda devices in various regions amplifies the potential scale of impact. Without timely mitigation, attackers can exploit this vulnerability remotely and without authentication, increasing the threat landscape considerably.
Mitigation Recommendations
To mitigate CVE-2025-11325, organizations should immediately check for firmware updates from Tenda addressing this vulnerability and apply them as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router’s management interfaces, especially the /goform/fast_setting_pppoe_set endpoint, by implementing firewall rules that limit access to trusted IP addresses only. Disabling remote management features or changing default credentials can reduce exposure. Monitoring network traffic for unusual activity or exploitation attempts targeting this endpoint is recommended. Additionally, segmenting the network to isolate vulnerable devices and employing intrusion detection/prevention systems can help detect and prevent exploitation. Users should also consider replacing affected devices with models from vendors with timely security support if patches are not forthcoming. Regular backups and incident response plans should be updated to prepare for potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T14:23:03.981Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e36cee0e76680ec164d64d
Added to database: 10/6/2025, 7:17:02 AM
Last enriched: 2/24/2026, 9:50:42 PM
Last updated: 3/21/2026, 11:02:11 PM
Views: 129
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.