Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11326: Stack-based Buffer Overflow in Tenda AC18

0
High
VulnerabilityCVE-2025-11326cvecve-2025-11326
Published: Mon Oct 06 2025 (10/06/2025, 07:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing manipulation of the argument wifi_chkHz can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/06/2025, 07:45:55 UTC

Technical Analysis

CVE-2025-11326 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19(6318). The flaw exists in the handling of the wifi_chkHz parameter within the /goform/WifiMacFilterSet endpoint. An attacker can remotely send a specially crafted request manipulating this argument to overflow the stack buffer, potentially overwriting control data such as return addresses. This can lead to arbitrary code execution with the privileges of the router's web management service. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication, and high impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the availability of proof-of-concept exploits increases the likelihood of future attacks. The vulnerability affects a widely deployed consumer and SMB router model, which is often used in home and small office networks, potentially serving as a foothold for attackers to pivot into larger organizational networks. The lack of official patches at the time of disclosure further elevates the risk. This vulnerability underscores the importance of secure coding practices in embedded device firmware and the need for timely patch management.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full compromise of affected Tenda AC18 routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This can result in unauthorized access to internal networks, data breaches, disruption of business operations, and potential lateral movement to more critical systems. Given the router's role as a network gateway, attackers could establish persistent backdoors or launch denial-of-service attacks. Small and medium enterprises, as well as home offices relying on these routers, are particularly vulnerable due to potentially weaker network defenses. The impact extends to confidentiality, integrity, and availability of organizational data and services. Additionally, critical infrastructure sectors using these devices could face operational disruptions. The public availability of exploit code increases the urgency for mitigation to prevent widespread exploitation across European networks.

Mitigation Recommendations

1. Immediately monitor Tenda's official channels for firmware updates addressing CVE-2025-11326 and apply patches as soon as they become available. 2. Until patches are released, restrict remote access to the router's management interface by disabling WAN-side administration and limiting access to trusted IP addresses. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/WifiMacFilterSet endpoint. 5. Regularly audit router configurations and logs for signs of exploitation attempts or unauthorized changes. 6. Educate users and administrators about the risks of this vulnerability and the importance of timely updates. 7. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed or unavailable. 8. Use strong, unique passwords for router administration to reduce risk of privilege escalation in case of partial exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T14:23:06.662Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e37266de39319c4ea35b79

Added to database: 10/6/2025, 7:40:22 AM

Last enriched: 10/6/2025, 7:45:55 AM

Last updated: 10/7/2025, 12:49:02 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats