Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11526: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11526cvecve-2025-11526
Published: Thu Oct 09 2025 (10/09/2025, 02:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

A vulnerability was found in Tenda AC7 15.03.06.44. The affected element is an unknown function of the file /goform/WifiMacFilterSet. Performing manipulation of the argument wifi_chkHz results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:09:55 UTC

Technical Analysis

CVE-2025-11526 is a stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The vulnerability exists in an unspecified function handling the /goform/WifiMacFilterSet endpoint, specifically when processing the wifi_chkHz argument. Improper validation or bounds checking of this input allows an attacker to overflow the stack buffer, potentially overwriting return addresses or control data. This flaw can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability by enabling remote code execution or causing device crashes. The exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. No patches or firmware updates are currently linked, so mitigation relies on network-level controls and vendor updates. The vulnerability affects a widely used consumer and small business router model, making it a significant risk for environments relying on Tenda AC7 devices for network connectivity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure security, especially for small and medium enterprises or home office setups using Tenda AC7 routers. Exploitation could allow attackers to gain unauthorized control over the router, intercept or manipulate network traffic, disrupt internet connectivity, or pivot into internal networks. This could lead to data breaches, espionage, or operational disruptions. Given the router’s role as a gateway device, compromise could undermine the security of connected devices and sensitive information. The public availability of exploit code increases the urgency for mitigation. Organizations in sectors with high reliance on secure communications, such as finance, healthcare, and critical infrastructure, face elevated risks. The lack of current patches means that without proactive measures, European entities remain vulnerable to remote attacks that can be launched from anywhere.

Mitigation Recommendations

1. Immediately check for and apply any firmware updates or patches released by Tenda addressing this vulnerability. 2. If no patch is available, consider temporarily replacing or isolating affected Tenda AC7 devices from critical network segments. 3. Implement network segmentation to limit access to the router’s management interfaces, restricting exposure to untrusted networks. 4. Deploy firewall rules to block or monitor traffic targeting the /goform/WifiMacFilterSet endpoint or suspicious payloads containing malformed wifi_chkHz parameters. 5. Enable logging and intrusion detection systems to detect anomalous requests indicative of exploitation attempts. 6. Educate users and administrators about the vulnerability and the importance of securing router management interfaces. 7. Consider using alternative router models with verified security if patching is delayed. 8. Regularly audit network devices for firmware versions and known vulnerabilities to maintain situational awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:30.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e7240f32de7eb26af75f73

Added to database: 10/9/2025, 2:55:11 AM

Last enriched: 10/9/2025, 3:09:55 AM

Last updated: 10/9/2025, 3:09:03 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats