Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12596: Buffer Overflow in Tenda AC23

0
High
VulnerabilityCVE-2025-12596cvecve-2025-12596
Published: Sun Nov 02 2025 (11/02/2025, 10:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC23

Description

A security vulnerability has been detected in Tenda AC23 16.03.07.52. Affected is the function saveParentControlInfo of the file /goform/saveParentControlInfo. Such manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 11/02/2025, 11:22:15 UTC

Technical Analysis

CVE-2025-12596 identifies a buffer overflow vulnerability in the Tenda AC23 router firmware version 16.03.07.52. The vulnerability resides in the saveParentControlInfo function within the /goform/saveParentControlInfo endpoint, where improper handling of the Time argument allows an attacker to overflow a buffer. This type of vulnerability can lead to memory corruption, enabling remote code execution or denial of service conditions. The attack vector is network-based (AV:N), requiring no authentication (AT:N) or user interaction (UI:N), making exploitation relatively straightforward for an attacker with network access to the device. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, with the potential for complete system compromise. Although no known exploits are currently active in the wild, the public disclosure of exploit details increases the likelihood of future attacks. The vulnerability affects a specific firmware version, so devices running 16.03.07.52 are at risk until patched. The lack of available patches at the time of disclosure necessitates interim mitigations such as network segmentation and access restrictions. Given the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant risk if devices are exposed to untrusted networks.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on affected Tenda AC23 routers, resulting in potential network compromise, interception or manipulation of traffic, and disruption of internet connectivity. This could impact confidentiality by exposing sensitive data, integrity by allowing attackers to alter network configurations or traffic, and availability by causing device crashes or denial of service. Small and medium enterprises, as well as home office setups relying on Tenda AC23 routers, are particularly vulnerable. Critical infrastructure or government networks using these devices could face operational disruptions or be leveraged as entry points for broader attacks. The ease of remote exploitation without authentication increases the threat level, especially for devices with exposed management interfaces or weak perimeter defenses. The public disclosure of exploit details further elevates the risk of widespread attacks targeting European networks.

Mitigation Recommendations

1. Immediately check for and apply any firmware updates provided by Tenda addressing this vulnerability. 2. If patches are not yet available, restrict network access to the router’s management interface by implementing firewall rules limiting access to trusted IP addresses only. 3. Disable remote management features on the Tenda AC23 router to reduce exposure. 4. Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 5. Monitor network traffic for unusual activity or attempts to access the /goform/saveParentControlInfo endpoint. 6. Consider replacing affected devices with models from vendors with a stronger security track record if timely patches are unavailable. 7. Educate users and administrators about the risks of exposing router management interfaces to the internet. 8. Use intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-01T17:21:21.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69073c6d82ffca841a909986

Added to database: 11/2/2025, 11:11:41 AM

Last enriched: 11/2/2025, 11:22:15 AM

Last updated: 11/3/2025, 2:59:41 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats