Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11327: Stack-based Buffer Overflow in Tenda AC18

0
High
VulnerabilityCVE-2025-11327cvecve-2025-11327
Published: Mon Oct 06 2025 (10/06/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The manipulation of the argument upnpEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 10/06/2025, 08:47:43 UTC

Technical Analysis

CVE-2025-11327 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.19(6318). The vulnerability resides in the /goform/SetUpnpCfg endpoint, specifically in the handling of the upnpEn parameter. Improper input validation or bounds checking allows an attacker to send a specially crafted request that overflows the stack buffer, potentially overwriting the return address or other control data. This can lead to arbitrary code execution on the device with elevated privileges, as the router firmware typically runs with high system rights. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 base score is 8.7, reflecting the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and no required privileges. Although no exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The Tenda AC18 is a widely used consumer and small business router, often deployed in home and small office environments, which may have less stringent network protections and more exposure to the internet. Attackers exploiting this vulnerability could gain control over the router, intercept or manipulate network traffic, launch further attacks on internal networks, or disrupt network availability.

Potential Impact

For European organizations, the impact of CVE-2025-11327 could be significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC18 routers. Successful exploitation can lead to full compromise of the router, allowing attackers to intercept sensitive communications, manipulate network traffic, or pivot to internal systems. This threatens confidentiality, integrity, and availability of organizational data and services. Disruption of network connectivity could impact business operations, while unauthorized access could facilitate further attacks such as data exfiltration or ransomware deployment. Given the router’s role as a network gateway, compromise could undermine perimeter defenses and expose internal assets. The risk is heightened in environments where remote management interfaces are exposed to the internet without adequate protections. Additionally, the lack of current patches means organizations must rely on network-level mitigations until vendor updates are released. The vulnerability also poses risks to critical infrastructure sectors that may use such routers in less monitored environments.

Mitigation Recommendations

1. Immediately restrict remote access to the router’s management interfaces, especially the /goform/SetUpnpCfg endpoint, by disabling remote administration or limiting access via firewall rules to trusted IP addresses. 2. Monitor network traffic for unusual or malformed requests targeting the /goform/SetUpnpCfg endpoint or other management URLs. 3. Implement network segmentation to isolate vulnerable routers from critical internal systems, reducing potential lateral movement. 4. Disable UPnP functionality if not required, as it is related to the vulnerable parameter, to reduce attack surface. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong network security policies. 8. Consider replacing vulnerable devices with models from vendors with stronger security track records if timely patches are not forthcoming.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T14:23:09.157Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e382204a42da91e758648b

Added to database: 10/6/2025, 8:47:28 AM

Last enriched: 10/6/2025, 8:47:43 AM

Last updated: 10/7/2025, 12:50:10 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats