Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15

0
High
VulnerabilityCVE-2025-11387cvecve-2025-11387
Published: Tue Oct 07 2025 (10/07/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC15

Description

A vulnerability was determined in Tenda AC15 15.03.05.18. This affects an unknown function of the file /goform/fast_setting_pppoe_set. This manipulation of the argument Password causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:54:38 UTC

Technical Analysis

CVE-2025-11387 is a stack-based buffer overflow vulnerability identified in the Tenda AC15 router firmware version 15.03.05.18. The vulnerability resides in an unspecified function handling the /goform/fast_setting_pppoe_set endpoint, specifically in the processing of the Password parameter. Due to insufficient bounds checking, an attacker can supply a crafted Password argument that overflows the stack buffer, potentially overwriting the return address or other control data. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to arbitrary code execution on the device, allowing attackers to gain control over the router. This could enable interception or manipulation of network traffic, disruption of network services, or use of the device as a foothold for further attacks within the network. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation. While no known exploits are currently reported in the wild, the public disclosure increases the likelihood of exploitation attempts. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected users and organizations.

Potential Impact

The impact of CVE-2025-11387 is significant for organizations using Tenda AC15 routers with the vulnerable firmware. Exploitation can lead to full compromise of the router, allowing attackers to execute arbitrary code remotely. This compromises the confidentiality, integrity, and availability of network communications passing through the device. Attackers could intercept sensitive data, redirect traffic, launch man-in-the-middle attacks, or disrupt network connectivity. In enterprise or critical infrastructure environments, this could result in operational downtime, data breaches, and loss of trust. Additionally, compromised routers can be leveraged as entry points for lateral movement within internal networks, increasing the risk of broader organizational compromise. The ease of remote exploitation without authentication or user interaction amplifies the threat, making widespread attacks feasible if the vulnerability is not addressed promptly.

Mitigation Recommendations

1. Immediate firmware update: Monitor Tenda's official channels for a security patch addressing CVE-2025-11387 and apply it as soon as it becomes available. 2. Network segmentation: Isolate vulnerable Tenda AC15 devices from critical network segments to limit potential attacker movement. 3. Access control: Restrict remote management access to the router, ideally limiting it to trusted IP addresses or disabling remote management entirely. 4. Intrusion detection: Deploy network-based intrusion detection systems (NIDS) to monitor for suspicious traffic targeting the /goform/fast_setting_pppoe_set endpoint or unusual POST requests containing anomalous Password parameters. 5. Temporary firewall rules: Block or filter incoming traffic to the router's management interface from untrusted networks until patches are applied. 6. Device replacement: For environments where patching is delayed or unsupported, consider replacing vulnerable devices with models from vendors with robust security update practices. 7. Regular auditing: Conduct periodic security assessments of network devices to detect unauthorized changes or signs of compromise. These measures collectively reduce the attack surface and mitigate the risk until a permanent fix is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T19:27:49.613Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4ecad4f7f35a6104f9b79

Added to database: 10/7/2025, 10:34:21 AM

Last enriched: 2/24/2026, 9:54:38 PM

Last updated: 3/23/2026, 4:01:27 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses