CVE-2025-11325: Stack-based Buffer Overflow in Tenda AC18
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-11325 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19(6318). The vulnerability resides in an unknown functionality related to the /goform/fast_setting_pppoe_set endpoint, specifically in the handling of the Username argument. By crafting a malicious request with a specially manipulated Username parameter, an attacker can overflow the stack buffer remotely, without requiring authentication or user interaction. This buffer overflow can potentially allow an attacker to execute arbitrary code on the device, leading to full compromise of the router. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit is available, increasing the likelihood of exploitation. The vulnerability affects only the specified firmware version, and no official patches have been linked yet. The router’s exposure to the internet and use in enterprise or home networks makes this a critical security concern.
Potential Impact
The impact of CVE-2025-11325 on European organizations can be significant. Successful exploitation could allow attackers to gain remote code execution on Tenda AC18 routers, leading to full device compromise. This can result in interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting into internal networks. Confidential data passing through the router could be exposed or altered, undermining data integrity and privacy. Availability of network services could be disrupted by denial-of-service conditions caused by the exploit. Given the widespread use of Tenda routers in small and medium enterprises and residential environments across Europe, the vulnerability poses a risk to both corporate and consumer networks. The public availability of an exploit increases the risk of automated attacks and widespread compromise. Organizations relying on these devices for critical connectivity or VPN termination are particularly vulnerable, potentially impacting business continuity and regulatory compliance related to data protection.
Mitigation Recommendations
To mitigate CVE-2025-11325, European organizations should first verify if they are using the affected Tenda AC18 firmware version 15.03.05.19(6318). Immediate steps include: 1) Applying any official firmware updates or patches released by Tenda as soon as they become available. 2) If patches are not yet available, restrict access to the router’s management interfaces from untrusted networks by implementing firewall rules or network segmentation. 3) Disable remote management features if not required, especially access to the /goform/fast_setting_pppoe_set endpoint. 4) Monitor network traffic for suspicious requests targeting the vulnerable endpoint or unusual Username parameter patterns. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit once available. 6) Consider replacing vulnerable devices with models from vendors with timely security support if patching is delayed. 7) Educate network administrators about the vulnerability and ensure incident response plans include steps for router compromise scenarios. These targeted actions go beyond generic advice by focusing on the specific vulnerable functionality and access vectors.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-11325: Stack-based Buffer Overflow in Tenda AC18
Description
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-11325 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19(6318). The vulnerability resides in an unknown functionality related to the /goform/fast_setting_pppoe_set endpoint, specifically in the handling of the Username argument. By crafting a malicious request with a specially manipulated Username parameter, an attacker can overflow the stack buffer remotely, without requiring authentication or user interaction. This buffer overflow can potentially allow an attacker to execute arbitrary code on the device, leading to full compromise of the router. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, a public exploit is available, increasing the likelihood of exploitation. The vulnerability affects only the specified firmware version, and no official patches have been linked yet. The router’s exposure to the internet and use in enterprise or home networks makes this a critical security concern.
Potential Impact
The impact of CVE-2025-11325 on European organizations can be significant. Successful exploitation could allow attackers to gain remote code execution on Tenda AC18 routers, leading to full device compromise. This can result in interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting into internal networks. Confidential data passing through the router could be exposed or altered, undermining data integrity and privacy. Availability of network services could be disrupted by denial-of-service conditions caused by the exploit. Given the widespread use of Tenda routers in small and medium enterprises and residential environments across Europe, the vulnerability poses a risk to both corporate and consumer networks. The public availability of an exploit increases the risk of automated attacks and widespread compromise. Organizations relying on these devices for critical connectivity or VPN termination are particularly vulnerable, potentially impacting business continuity and regulatory compliance related to data protection.
Mitigation Recommendations
To mitigate CVE-2025-11325, European organizations should first verify if they are using the affected Tenda AC18 firmware version 15.03.05.19(6318). Immediate steps include: 1) Applying any official firmware updates or patches released by Tenda as soon as they become available. 2) If patches are not yet available, restrict access to the router’s management interfaces from untrusted networks by implementing firewall rules or network segmentation. 3) Disable remote management features if not required, especially access to the /goform/fast_setting_pppoe_set endpoint. 4) Monitor network traffic for suspicious requests targeting the vulnerable endpoint or unusual Username parameter patterns. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit once available. 6) Consider replacing vulnerable devices with models from vendors with timely security support if patching is delayed. 7) Educate network administrators about the vulnerability and ensure incident response plans include steps for router compromise scenarios. These targeted actions go beyond generic advice by focusing on the specific vulnerable functionality and access vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T14:23:03.981Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e36cee0e76680ec164d64d
Added to database: 10/6/2025, 7:17:02 AM
Last enriched: 10/6/2025, 7:17:17 AM
Last updated: 10/7/2025, 7:04:36 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11354: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-10162: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Admin and Customer Messages After Order for WooCommerce: OrderConvo
UnknownCVE-2025-11353: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-11362: Allocation of Resources Without Limits or Throttling in pdfmake
HighCVE-2025-11352: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.