Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11356: Buffer Overflow in Tenda AC23

0
High
VulnerabilityCVE-2025-11356cvecve-2025-11356
Published: Tue Oct 07 2025 (10/07/2025, 07:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC23

Description

A vulnerability was found in Tenda AC23 up to 16.03.07.52. Affected by this issue is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/07/2025, 07:11:25 UTC

Technical Analysis

CVE-2025-11356 is a buffer overflow vulnerability identified in the Tenda AC23 router firmware versions up to 16.03.07.52. The vulnerability resides in the sscanf function used by the /goform/SetStaticRouteCfg endpoint, which processes static route configuration parameters. Improper handling of input arguments allows an attacker to overflow a buffer remotely without requiring authentication or user interaction. This overflow can corrupt memory, potentially enabling arbitrary code execution, denial of service, or complete device compromise. The vulnerability is remotely exploitable over the network, making it particularly dangerous for exposed devices. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. While no confirmed exploits are currently active in the wild, public proof-of-concept exploits have been released, increasing the risk of imminent attacks. The affected product, Tenda AC23, is a widely used consumer and small business Wi-Fi 6 router, often deployed in home offices and small enterprises. The vulnerability’s exploitation could allow attackers to gain persistent control over network traffic, intercept sensitive data, or disrupt network availability. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts by network administrators.

Potential Impact

For European organizations, this vulnerability poses a significant threat due to the widespread use of Tenda AC23 routers in both residential and small business environments. Successful exploitation could lead to unauthorized access to internal networks, interception of confidential communications, and disruption of network services. Critical sectors such as finance, healthcare, and government agencies that rely on secure and stable network infrastructure may face data breaches or operational outages. The ability to remotely exploit the vulnerability without authentication increases the risk of automated attacks and worm-like propagation within vulnerable networks. Additionally, compromised routers could be leveraged as pivot points for lateral movement or as part of botnets targeting European infrastructure. The impact extends beyond individual organizations to national cybersecurity, especially where Tenda devices are integrated into essential services or critical infrastructure.

Mitigation Recommendations

1. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-11356 and apply patches immediately upon release. 2. Until patches are available, disable remote management interfaces (especially WAN-side access) on all Tenda AC23 routers to reduce exposure. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting /goform/SetStaticRouteCfg. 5. Conduct network scans to identify all Tenda AC23 devices and verify firmware versions to prioritize remediation. 6. Enforce strict access controls and monitor router logs for anomalous configuration changes or suspicious traffic patterns. 7. Educate users and administrators about the risks of using outdated router firmware and the importance of timely updates. 8. Consider temporary replacement of vulnerable devices in high-risk environments with alternative hardware until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T06:33:20.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4bd0a62e88349a68c2792

Added to database: 10/7/2025, 7:11:06 AM

Last enriched: 10/7/2025, 7:11:25 AM

Last updated: 10/7/2025, 11:01:16 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats