Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11524: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11524cvecve-2025-11524
Published: Thu Oct 09 2025 (10/09/2025, 01:02:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

A flaw has been found in Tenda AC7 15.03.06.44. This issue affects some unknown processing of the file /goform/SetDDNSCfg. This manipulation of the argument ddnsEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:01:49 UTC

Technical Analysis

CVE-2025-11524 is a stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The vulnerability arises from improper processing of the ddnsEn parameter in the /goform/SetDDNSCfg endpoint, which is part of the router's Dynamic DNS configuration interface. By sending a specially crafted request manipulating this argument, an attacker can overflow the stack buffer, potentially overwriting the return address or other control data on the stack. This can lead to arbitrary code execution with the privileges of the router's firmware process, which typically runs with high system privileges. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it accessible to any attacker who can reach the device's management interface. The CVSS v4.0 base score is 8.7, reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of attacks. The lack of an official patch at the time of disclosure further elevates the risk. This vulnerability affects network infrastructure devices widely used in home and small office environments, potentially allowing attackers to gain persistent control over affected routers, intercept or manipulate network traffic, and pivot to internal networks.

Potential Impact

The impact of CVE-2025-11524 is significant for organizations relying on Tenda AC7 routers, especially in environments where these devices serve as primary gateways or manage critical network functions. Exploitation can lead to full compromise of the router, enabling attackers to execute arbitrary code, disrupt network availability, intercept or alter network traffic, and potentially launch further attacks against internal systems. This undermines the confidentiality, integrity, and availability of organizational networks. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns. Small and medium businesses, home offices, and even some enterprise environments using these routers are vulnerable. The absence of a patch at disclosure time means organizations must rely on mitigations to reduce exposure. Given the router's role in network perimeter defense, successful exploitation could facilitate lateral movement and data exfiltration, posing a severe threat to organizational security.

Mitigation Recommendations

1. Immediately restrict access to the router's management interfaces, especially the /goform/SetDDNSCfg endpoint, by limiting exposure to trusted internal networks only. 2. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 3. Monitor network traffic for unusual or malformed requests targeting the DDNS configuration endpoint, using IDS/IPS solutions with custom signatures if necessary. 4. Disable Dynamic DNS features if not required to reduce the attack surface. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. If patching is not immediately possible, consider replacing affected devices with alternative hardware from vendors with timely security support. 7. Employ strong network perimeter defenses, including firewalls and VPNs, to limit remote access to router management interfaces. 8. Educate network administrators about this vulnerability and encourage proactive security hygiene, including changing default credentials and auditing device configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:24.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e7125c32de7eb26af5972a

Added to database: 10/9/2025, 1:39:40 AM

Last enriched: 2/24/2026, 10:01:49 PM

Last updated: 3/28/2026, 9:45:40 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses