Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11586: Stack-based Buffer Overflow in Tenda AC7

0
High
VulnerabilityCVE-2025-11586cvecve-2025-11586
Published: Fri Oct 10 2025 (10/10/2025, 21:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC7

Description

A vulnerability was determined in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/setNotUpgrade. This manipulation of the argument newVersion causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:29:52 UTC

Technical Analysis

CVE-2025-11586 identifies a stack-based buffer overflow vulnerability in the Tenda AC7 router firmware version 15.03.06.44. The flaw resides in an unspecified function associated with the /goform/setNotUpgrade endpoint, where the 'newVersion' parameter is improperly handled, allowing an attacker to overflow the stack buffer. This vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The overflow can lead to arbitrary code execution or denial of service conditions, compromising the confidentiality, integrity, and availability of the device. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation. Although no confirmed exploits in the wild have been reported, the public disclosure of exploit details increases the likelihood of imminent attacks. The Tenda AC7 is a popular consumer-grade router, often deployed in home and small office environments, which may lack advanced security monitoring, thus increasing exposure. The vulnerability's exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and pivot to internal networks. The lack of vendor-provided patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

The exploitation of CVE-2025-11586 can have severe consequences for affected organizations and individuals. Successful attacks can lead to full compromise of the Tenda AC7 router, enabling attackers to execute arbitrary code with elevated privileges. This can result in unauthorized access to internal networks, interception and manipulation of sensitive data, disruption of network services, and the establishment of persistent backdoors. For home users and small businesses relying on these routers, this could mean exposure of personal or corporate information, loss of network availability, and potential use of compromised devices in larger botnet campaigns. The remote, unauthenticated nature of the exploit broadens the attack surface significantly, allowing attackers to target vulnerable devices en masse from anywhere on the internet. Given the widespread use of Tenda routers in various regions, the impact could be substantial, particularly where firmware updates are not promptly applied or where network segmentation is weak.

Mitigation Recommendations

To mitigate the risks posed by CVE-2025-11586, organizations and users should take the following specific actions: 1) Immediately check for and apply any firmware updates or patches released by Tenda addressing this vulnerability. If no official patch is available, consider temporarily disabling remote management features or restricting access to the /goform/setNotUpgrade endpoint via firewall rules or router access control lists. 2) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect and block exploit attempts targeting this vulnerability's signature or anomalous requests to the vulnerable endpoint. 3) Segment networks to isolate critical systems from vulnerable routers, minimizing lateral movement opportunities for attackers. 4) Monitor router logs and network traffic for unusual activity indicative of exploitation attempts, including unexpected requests to the vulnerable endpoint or signs of command execution. 5) Educate users about the risks of using outdated router firmware and encourage regular updates. 6) Consider deploying alternative, more secure networking equipment if timely patches are not forthcoming. These measures go beyond generic advice by focusing on immediate containment, detection, and network architecture adjustments to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T11:53:19.717Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e9756d807ca07d502307f8

Added to database: 10/10/2025, 9:06:53 PM

Last enriched: 2/24/2026, 9:29:52 PM

Last updated: 3/25/2026, 4:09:50 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses