Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12611: Buffer Overflow in Tenda AC21

0
High
VulnerabilityCVE-2025-12611cvecve-2025-12611
Published: Mon Nov 03 2025 (11/03/2025, 02:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A vulnerability was identified in Tenda AC21 16.03.08.16. This vulnerability affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument startIp leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:14:52 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12611 affects the Tenda AC21 router running firmware version 16.03.08.16. It is a buffer overflow flaw located in the formSetPPTPServer function of the /goform/SetPptpServerCfg endpoint. Specifically, the vulnerability arises from improper validation and handling of the startIp parameter, which can be manipulated by a remote attacker to overflow a buffer. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, all rated high. Although no known exploits are currently active in the wild, publicly available exploit code exists, which could facilitate rapid weaponization. The flaw affects a widely used consumer and small business router model, potentially exposing numerous networks to compromise. No official patches or mitigation links are provided yet, indicating the need for immediate defensive measures by users and administrators.

Potential Impact

The impact of CVE-2025-12611 is significant for organizations and individuals using the Tenda AC21 router. Successful exploitation can allow attackers to execute arbitrary code remotely, leading to full device compromise. This could enable attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or disrupt network availability through denial-of-service conditions. The confidentiality of sensitive data passing through the router is at risk, as is the integrity of network communications. The availability of network services can also be affected, potentially causing outages. Since the vulnerability requires no authentication or user interaction, it can be exploited by attackers scanning for vulnerable devices on the internet, increasing the scale and speed of potential attacks. This poses a threat to home users, small businesses, and any organizations relying on these routers for critical connectivity.

Mitigation Recommendations

To mitigate CVE-2025-12611, affected users should immediately check for firmware updates from Tenda and apply any patches once available. In the absence of official patches, users should disable the PPTP server functionality if not required, as this is the vulnerable component. Network administrators should implement network-level protections such as firewall rules to restrict access to the router’s management interfaces, especially blocking inbound traffic to the /goform/SetPptpServerCfg endpoint. Employing network segmentation to isolate vulnerable devices can limit the impact of a compromise. Monitoring network traffic for unusual activity targeting the router can help detect exploitation attempts early. Additionally, users should consider replacing affected devices with models from vendors with a stronger security track record if patches are delayed. Regularly auditing router configurations and disabling unnecessary services reduces the attack surface. Finally, educating users about the risks of exposed network devices and encouraging timely updates is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-02T06:28:46.133Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6908179b68fbb04b61ed8a19

Added to database: 11/3/2025, 2:46:51 AM

Last enriched: 2/24/2026, 10:14:52 PM

Last updated: 3/23/2026, 8:30:31 AM

Views: 225

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses