Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12619: Buffer Overflow in Tenda A15

0
High
VulnerabilityCVE-2025-12619cvecve-2025-12619
Published: Mon Nov 03 2025 (11/03/2025, 07:02:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: A15

Description

A vulnerability was found in Tenda A15 15.13.07.13. Affected is the function fromSetWirelessRepeat of the file /goform/openNetworkGateway. The manipulation of the argument wpapsk_crypto2_4g results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:16:23 UTC

Technical Analysis

CVE-2025-12619 is a remote buffer overflow vulnerability identified in the Tenda A15 router firmware version 15.13.07.13. The issue resides in the fromSetWirelessRepeat function, specifically in the handling of the wpapsk_crypto2_4g parameter within the /goform/openNetworkGateway endpoint. Improper validation or sanitization of this argument allows an attacker to overflow a buffer, potentially overwriting adjacent memory. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of future attacks. The affected product, Tenda A15, is a popular consumer router model used worldwide, often in home and small office environments. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.

Potential Impact

The vulnerability poses significant risks to organizations and individuals using the Tenda A15 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code, intercept or manipulate network traffic, disrupt network availability, or pivot to internal networks. This undermines the confidentiality, integrity, and availability of network communications and connected devices. For enterprises relying on these routers in branch offices or remote sites, the impact includes potential data breaches, operational disruptions, and increased attack surface for lateral movement. The ease of remote exploitation without authentication amplifies the threat, enabling widespread scanning and targeting by malicious actors. The public availability of an exploit increases the urgency for mitigation. Failure to address this vulnerability could result in significant security incidents, including espionage, ransomware deployment, or service outages.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating affected Tenda A15 devices from untrusted networks, especially the internet, to reduce exposure. 2. Network administrators should implement strict firewall rules to block access to the /goform/openNetworkGateway endpoint or restrict access to trusted IP addresses only. 3. Monitor network traffic for unusual requests targeting the wpapsk_crypto2_4g parameter or signs of buffer overflow exploitation attempts. 4. If possible, disable remote management features on the router to limit attack vectors. 5. Regularly check for official firmware updates or patches from Tenda addressing this vulnerability and apply them promptly once available. 6. Consider replacing vulnerable devices with models from vendors with stronger security track records if patches are delayed. 7. Employ network segmentation to limit the impact of a compromised router on critical internal systems. 8. Conduct vulnerability scans and penetration tests to identify and remediate exposure. 9. Educate users about the risks of using outdated router firmware and encourage timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-02T14:56:30.250Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690856ef4b5305b1c0ad521d

Added to database: 11/3/2025, 7:17:03 AM

Last enriched: 2/24/2026, 10:16:23 PM

Last updated: 3/23/2026, 11:32:30 PM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses