Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11525: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11525cvecve-2025-11525
Published: Thu Oct 09 2025 (10/09/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

CVE-2025-11525 is a high-severity stack-based buffer overflow vulnerability in the Tenda AC7 router firmware version 15. 03. 06. 44. The flaw exists in the /goform/SetUpnpCfg endpoint, where manipulation of the upnpEn argument can trigger the overflow. This vulnerability can be exploited remotely without authentication or user interaction, allowing attackers to potentially execute arbitrary code or cause denial of service. Although no public exploits are currently known to be actively used in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. European organizations using Tenda AC7 routers, especially in small office or home office environments, may face significant risks including network compromise and lateral movement. Mitigation requires immediate firmware updates from the vendor or network-level protections such as blocking access to the vulnerable endpoint. Countries with higher adoption of Tenda networking equipment and critical infrastructure relying on such devices are at greater risk.

AI-Powered Analysis

AILast updated: 10/09/2025, 01:54:37 UTC

Technical Analysis

CVE-2025-11525 is a stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The vulnerability resides in an unspecified function handling the /goform/SetUpnpCfg endpoint, specifically through improper handling of the upnpEn parameter. By sending a crafted request to this endpoint, an attacker can overflow the stack buffer, potentially overwriting control data such as return addresses or function pointers. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices exposed to the internet or internal networks. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges or user interaction needed. Although no known exploits are currently active in the wild, the public disclosure of exploit details increases the likelihood of imminent exploitation attempts. The affected product, Tenda AC7, is a consumer-grade Wi-Fi 6 router commonly used in small office and home office environments, which may be deployed in European organizations with less stringent network security controls. The vulnerability's exploitation could allow attackers to gain persistent footholds within networks, intercept or manipulate traffic, or disrupt network availability. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, access controls, and monitoring for suspicious activity targeting the vulnerable endpoint.

Potential Impact

For European organizations, the exploitation of CVE-2025-11525 could lead to severe consequences including unauthorized remote code execution on network routers, enabling attackers to intercept, modify, or redirect network traffic. This compromises confidentiality and integrity of sensitive communications. Additionally, successful exploitation could cause denial of service by crashing the device, impacting availability of critical network infrastructure. Small and medium enterprises relying on Tenda AC7 routers without robust network segmentation or monitoring are particularly vulnerable. The ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with routers exposed to the internet or poorly secured internal networks. Compromise of these routers could facilitate lateral movement within corporate networks, potentially leading to broader intrusions affecting enterprise IT systems. Given the critical role of network devices in maintaining secure communications, this vulnerability poses a significant risk to operational continuity and data protection compliance obligations under European regulations such as GDPR.

Mitigation Recommendations

1. Immediately check for and apply any firmware updates or patches released by Tenda addressing CVE-2025-11525. 2. If patches are not yet available, restrict access to the router's management interfaces, especially the /goform/SetUpnpCfg endpoint, by implementing firewall rules to block inbound traffic from untrusted networks. 3. Disable UPnP functionality on the Tenda AC7 routers if not required, as the vulnerability is related to the UPnP configuration endpoint. 4. Employ network segmentation to isolate vulnerable routers from critical enterprise systems and sensitive data. 5. Monitor network traffic for unusual or malformed requests targeting the /goform/SetUpnpCfg endpoint or other router management interfaces. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. 7. Educate IT staff and users about the risks of using consumer-grade routers in enterprise environments and encourage deployment of enterprise-grade network equipment with robust security features. 8. Maintain an inventory of all network devices to identify and prioritize remediation of vulnerable Tenda AC7 routers. 9. Consider implementing VPNs or other secure remote access methods to reduce exposure of router management interfaces to the internet.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:27.715Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e7125c32de7eb26af59731

Added to database: 10/9/2025, 1:39:40 AM

Last enriched: 10/9/2025, 1:54:37 AM

Last updated: 10/9/2025, 3:11:13 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats