Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11528: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11528cvecve-2025-11528
Published: Thu Oct 09 2025 (10/09/2025, 03:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

CVE-2025-11528 is a high-severity stack-based buffer overflow vulnerability in the Tenda AC7 router firmware version 15. 03. 06. 44. The flaw exists in the /goform/saveAutoQos endpoint, where manipulation of the 'enable' argument can trigger the overflow. This vulnerability is remotely exploitable without user interaction or authentication, allowing attackers to potentially execute arbitrary code with elevated privileges. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of affected devices. European organizations using Tenda AC7 routers should prioritize patching or mitigating this issue to prevent compromise. Countries with higher adoption of Tenda networking equipment and critical infrastructure relying on such devices are at greater risk.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:54:45 UTC

Technical Analysis

CVE-2025-11528 is a stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The vulnerability resides in an unspecified function handling the /goform/saveAutoQos endpoint, specifically triggered by malicious manipulation of the 'enable' argument. This flaw allows an attacker to overflow the stack buffer, which can lead to arbitrary code execution on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, significantly increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high severity due to the ease of exploitation (network vector, low attack complexity), no privileges or user interaction needed, and the potential for full compromise of the device's confidentiality, integrity, and availability. The exploit code is publicly available, which could facilitate attacks by less skilled adversaries. The affected product, Tenda AC7, is a consumer and small business wireless router commonly used for internet connectivity. Exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, disrupt network services, or pivot into internal networks. No official patches or firmware updates have been linked yet, increasing the urgency for mitigation. The vulnerability's presence in a widely deployed router model makes it a significant threat vector, especially in environments where these devices are used as primary network gateways.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to network security and operational continuity. Compromise of Tenda AC7 routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of business-critical services. Given the router’s role as a network gateway, attackers could launch further attacks against connected systems, escalate privileges, or exfiltrate confidential information. Small and medium enterprises, home offices, and branch offices that rely on Tenda AC7 devices without robust network segmentation are particularly vulnerable. The availability of a public exploit increases the likelihood of opportunistic attacks, including by cybercriminal groups targeting European entities. Additionally, critical infrastructure sectors such as healthcare, finance, and government agencies using these routers may face heightened risks of espionage or sabotage. The vulnerability could also undermine trust in network reliability and data privacy, leading to regulatory and compliance challenges under frameworks like GDPR. Overall, the impact spans confidentiality, integrity, and availability, with potential cascading effects on organizational security posture.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda AC7 routers from critical network segments to limit potential lateral movement in case of compromise. 2. Disable or restrict access to the /goform/saveAutoQos endpoint if possible, using router configuration or firewall rules to block unauthorized requests. 3. Monitor network traffic for anomalous requests targeting the vulnerable endpoint, employing intrusion detection/prevention systems with updated signatures. 4. Apply firmware updates as soon as Tenda releases a patch addressing this vulnerability; regularly check vendor advisories. 5. Replace affected routers with models from vendors with a strong security track record if patching is delayed or unavailable. 6. Implement strict access controls on router management interfaces, including changing default credentials and limiting remote management. 7. Educate IT staff about this vulnerability and the risks of using unpatched consumer-grade networking equipment in enterprise environments. 8. Consider deploying network-level protections such as web application firewalls or reverse proxies to filter malicious payloads targeting router endpoints. 9. Conduct regular security assessments and penetration testing to identify and remediate similar vulnerabilities proactively. 10. Maintain an incident response plan that includes steps for containment and recovery from router compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:35.549Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e727b132de7eb26af7f8ea

Added to database: 10/9/2025, 3:10:41 AM

Last enriched: 10/16/2025, 8:54:45 AM

Last updated: 11/20/2025, 8:48:53 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats