Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11528: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11528cvecve-2025-11528
Published: Thu Oct 09 2025 (10/09/2025, 03:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

A vulnerability was identified in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/saveAutoQos. The manipulation of the argument enable leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:24:34 UTC

Technical Analysis

CVE-2025-11528 is a stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The flaw exists in an unspecified function within the /goform/saveAutoQos endpoint, where manipulation of the 'enable' argument leads to a buffer overflow on the stack. This vulnerability allows remote attackers to execute arbitrary code on the device without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability with high severity, as exploitation can lead to full device compromise, enabling attackers to intercept, modify, or disrupt network traffic. The vulnerability is remotely exploitable over the network, making it a significant threat to any organization using affected Tenda AC7 devices. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the likelihood of future attacks. The lack of a patch link suggests that a firmware update may not yet be released, emphasizing the need for proactive mitigation. The vulnerability's presence in a consumer-grade router used in enterprise and home environments alike broadens the attack surface. Attackers could leverage this flaw to establish persistent access, pivot within networks, or launch further attacks against connected systems.

Potential Impact

For European organizations, the impact of CVE-2025-11528 can be substantial. Compromise of Tenda AC7 routers could lead to interception and manipulation of sensitive data traversing the network, undermining confidentiality. Integrity of network traffic and device configurations can be altered, potentially disrupting business operations or enabling further lateral movement by attackers. Availability may be affected if the device is rendered inoperable or used as a launchpad for denial-of-service attacks. Organizations relying on Tenda AC7 devices for critical network functions, including SMEs and some public sector entities, face increased risk. The remote, unauthenticated nature of the exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors. The availability of a public exploit increases the likelihood of opportunistic attacks targeting vulnerable devices. This vulnerability could also be exploited to infiltrate networks of European critical infrastructure if these routers are deployed there, amplifying potential national security concerns.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to limit exposure of the vulnerable /goform/saveAutoQos endpoint. Organizations should implement strict firewall rules to block inbound traffic to the router's management interfaces from untrusted networks. Network segmentation can isolate vulnerable devices from sensitive systems. Monitoring network traffic for unusual requests to the /goform/saveAutoQos path can help detect exploitation attempts. Until an official firmware patch is released, consider disabling AutoQoS features if possible or replacing affected devices with alternatives not impacted by this vulnerability. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect attempts to exploit this buffer overflow. Regularly check vendor communications for firmware updates and apply patches promptly once available. Educate network administrators about the vulnerability and signs of compromise. For organizations with large deployments, conduct an inventory to identify all affected devices and prioritize remediation efforts accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:35.549Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e727b132de7eb26af7f8ea

Added to database: 10/9/2025, 3:10:41 AM

Last enriched: 10/9/2025, 3:24:34 AM

Last updated: 10/9/2025, 11:23:02 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats