CVE-2025-12225: Stack-based Buffer Overflow in Tenda AC6
A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-12225 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 router firmware version 15.03.06.50. The flaw exists in the HTTP request handler component, specifically in the processing of the shareSpeed parameter within the /goform/WifiGuestSet endpoint. An attacker can remotely send a crafted HTTP request with a manipulated shareSpeed argument that overflows the stack buffer, potentially overwriting critical memory regions. This can lead to arbitrary code execution with elevated privileges on the device, allowing attackers to take full control of the router. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS v4.0 score is 8.7 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The affected product, Tenda AC6, is a widely used consumer and small business router, often deployed in home and small office networks. The lack of an official patch or mitigation guidance at the time of disclosure necessitates immediate defensive measures to reduce risk.
Potential Impact
For European organizations, the exploitation of CVE-2025-12225 could lead to complete compromise of affected Tenda AC6 routers, resulting in unauthorized network access, interception or manipulation of network traffic, and potential pivoting to internal systems. This threatens the confidentiality of sensitive data, the integrity of network communications, and the availability of network services. Small and medium enterprises (SMEs) and home office users relying on these routers are particularly vulnerable due to typically weaker network segmentation and security controls. The compromise of routers can also facilitate large-scale attacks such as botnet recruitment or man-in-the-middle attacks targeting European businesses and consumers. Given the remote, unauthenticated nature of the exploit, attackers can operate stealthily and at scale, increasing the risk of widespread impact across Europe.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC6 devices from critical network segments to limit exposure. 2. Disable the guest Wi-Fi feature if it is not required, as the vulnerability is triggered via the WifiGuestSet endpoint. 3. Implement network-level filtering to block HTTP requests targeting /goform/WifiGuestSet or suspicious shareSpeed parameter values. 4. Monitor network traffic and device logs for unusual HTTP requests or signs of exploitation attempts. 5. Where possible, replace affected devices with routers from vendors with timely security updates. 6. Engage with Tenda support channels to obtain firmware updates or official patches as they become available. 7. Educate users on the risks of using outdated router firmware and encourage regular updates. 8. Employ network segmentation and zero-trust principles to minimize the impact of compromised devices. 9. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-12225: Stack-based Buffer Overflow in Tenda AC6
Description
A vulnerability has been found in Tenda AC6 15.03.06.50. This issue affects some unknown processing of the file /goform/WifiGuestSet of the component HTTP Request Handler. Such manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-12225 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 router firmware version 15.03.06.50. The flaw exists in the HTTP request handler component, specifically in the processing of the shareSpeed parameter within the /goform/WifiGuestSet endpoint. An attacker can remotely send a crafted HTTP request with a manipulated shareSpeed argument that overflows the stack buffer, potentially overwriting critical memory regions. This can lead to arbitrary code execution with elevated privileges on the device, allowing attackers to take full control of the router. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS v4.0 score is 8.7 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The affected product, Tenda AC6, is a widely used consumer and small business router, often deployed in home and small office networks. The lack of an official patch or mitigation guidance at the time of disclosure necessitates immediate defensive measures to reduce risk.
Potential Impact
For European organizations, the exploitation of CVE-2025-12225 could lead to complete compromise of affected Tenda AC6 routers, resulting in unauthorized network access, interception or manipulation of network traffic, and potential pivoting to internal systems. This threatens the confidentiality of sensitive data, the integrity of network communications, and the availability of network services. Small and medium enterprises (SMEs) and home office users relying on these routers are particularly vulnerable due to typically weaker network segmentation and security controls. The compromise of routers can also facilitate large-scale attacks such as botnet recruitment or man-in-the-middle attacks targeting European businesses and consumers. Given the remote, unauthenticated nature of the exploit, attackers can operate stealthily and at scale, increasing the risk of widespread impact across Europe.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC6 devices from critical network segments to limit exposure. 2. Disable the guest Wi-Fi feature if it is not required, as the vulnerability is triggered via the WifiGuestSet endpoint. 3. Implement network-level filtering to block HTTP requests targeting /goform/WifiGuestSet or suspicious shareSpeed parameter values. 4. Monitor network traffic and device logs for unusual HTTP requests or signs of exploitation attempts. 5. Where possible, replace affected devices with routers from vendors with timely security updates. 6. Engage with Tenda support channels to obtain firmware updates or official patches as they become available. 7. Educate users on the risks of using outdated router firmware and encourage regular updates. 8. Employ network segmentation and zero-trust principles to minimize the impact of compromised devices. 9. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T16:55:00.619Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68feff90748f7c5f7c9b0420
Added to database: 10/27/2025, 5:13:52 AM
Last enriched: 11/3/2025, 6:11:30 AM
Last updated: 12/10/2025, 2:49:37 PM
Views: 126
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13155: CWE-276: Incorrect Default Permissions in Lenovo Baiying Client
HighCVE-2025-13152: CWE-427: Uncontrolled Search Path Element in Lenovo One Client
HighCVE-2025-13125: CWE-639 Authorization Bypass Through User-Controlled Key in Im Park Information Technology, Electronics, Press, Publishing and Advertising, Education Ltd. Co. DijiDemi
MediumCVE-2025-12046: CWE-427: Uncontrolled Search Path Element in Lenovo App Store
HighCVE-2025-13127: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in TAC Information Services Internal and External Trade Inc. GoldenHorn
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.