Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11386: Stack-based Buffer Overflow in Tenda AC15

0
High
VulnerabilityCVE-2025-11386cvecve-2025-11386
Published: Tue Oct 07 2025 (10/07/2025, 10:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC15

Description

A vulnerability was found in Tenda AC15 15.03.05.18. The impacted element is an unknown function of the file /goform/SetDDNSCfg of the component POST Parameter Handler. The manipulation of the argument ddnsEn results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/07/2025, 10:15:39 UTC

Technical Analysis

CVE-2025-11386 is a stack-based buffer overflow vulnerability identified in the Tenda AC15 router firmware version 15.03.05.18. The vulnerability resides in an unspecified function handling POST requests to the /goform/SetDDNSCfg endpoint, specifically when processing the ddnsEn parameter. By sending a specially crafted POST request with manipulated ddnsEn data, an attacker can overflow the stack buffer, potentially overwriting return addresses or other control data. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. While no active exploitation has been reported, a public exploit is available, increasing the likelihood of attacks. The vulnerability affects a widely deployed consumer and small business router model, which may be used in various European networks. The lack of an official patch at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

For European organizations, the exploitation of CVE-2025-11386 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Compromise of routers can serve as a foothold for lateral movement, data exfiltration, or launching further attacks such as ransomware or espionage campaigns. Small and medium enterprises, as well as home office environments relying on Tenda AC15 routers, are particularly vulnerable due to potentially weaker security monitoring. Critical infrastructure or government networks using these devices could face operational disruptions or data breaches. The public availability of an exploit increases the risk of opportunistic attacks, including automated scanning and exploitation by threat actors. The vulnerability’s remote and unauthenticated nature means attackers can target devices exposed to the internet or accessible from less secure internal networks.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda AC15 routers running firmware version 15.03.05.18 within the network. 2. Monitor vendor communications closely for official firmware updates addressing this vulnerability and apply patches promptly upon release. 3. Until patches are available, restrict access to the /goform/SetDDNSCfg endpoint by implementing network-level controls such as firewall rules or access control lists to block unauthorized external and internal access. 4. Disable remote management features on affected routers if not required, especially WAN-side access. 5. Employ network segmentation to isolate vulnerable devices from critical assets and sensitive data. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting this vulnerability. 7. Educate users and administrators about the risk and signs of compromise related to router vulnerabilities. 8. Consider replacing affected devices with models from vendors with stronger security track records if patching is delayed or unsupported.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T19:27:46.950Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4e83c434a490243dbbf1a

Added to database: 10/7/2025, 10:15:24 AM

Last enriched: 10/7/2025, 10:15:39 AM

Last updated: 10/7/2025, 1:16:06 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats