Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13258: Buffer Overflow in Tenda AC20

0
High
VulnerabilityCVE-2025-13258cvecve-2025-13258
Published: Mon Nov 17 2025 (11/17/2025, 02:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is an unknown function of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 11/17/2025, 02:43:23 UTC

Technical Analysis

CVE-2025-13258 identifies a buffer overflow vulnerability in the Tenda AC20 wireless router firmware versions up to 16.03.08.12. The vulnerability resides in an unspecified function handling requests to the /goform/WifiExtraSet endpoint, specifically through the manipulation of the wpapsk_crypto parameter. This parameter is improperly validated, allowing an attacker to overflow a buffer remotely without authentication or user interaction. The buffer overflow can lead to memory corruption, enabling an attacker to execute arbitrary code with elevated privileges or cause a denial of service by crashing the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with attack vector network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, with high exploitability and scope limited to the device itself. Although no exploits have been observed in the wild, a public exploit is available, increasing the urgency for mitigation. The vulnerability affects multiple firmware versions from 16.03.08.0 through 16.03.08.12, all of which should be considered vulnerable until patched. The lack of official patch links suggests that users must monitor vendor advisories closely or apply workarounds to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for enterprises and service providers using Tenda AC20 routers in their network infrastructure. Successful exploitation could allow attackers to gain remote control over affected routers, leading to interception or manipulation of network traffic, disruption of internet connectivity, or pivoting to internal networks for further compromise. This is especially critical for organizations relying on these devices for secure Wi-Fi access or remote management. The confidentiality of sensitive data could be compromised, integrity of network configurations altered, and availability of network services disrupted. Given the public availability of an exploit and the remote, unauthenticated attack vector, the threat landscape is elevated. Organizations with exposed management interfaces or weak network segmentation are at higher risk. The impact extends to critical infrastructure sectors, SMBs, and home office environments that use Tenda AC20 devices, potentially affecting business continuity and data protection compliance under GDPR.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda AC20 devices within the network and verify their firmware versions. 2. Apply vendor-provided firmware updates as soon as they become available; monitor Tenda’s official channels for patches addressing CVE-2025-13258. 3. If patches are not yet available, restrict access to the /goform/WifiExtraSet endpoint by implementing network-level controls such as firewall rules or access control lists limiting management interface exposure. 4. Disable remote management features on Tenda AC20 devices unless absolutely necessary, and if enabled, restrict access to trusted IP addresses only. 5. Employ network segmentation to isolate vulnerable devices from critical network segments. 6. Monitor network traffic for unusual activity targeting the vulnerable endpoint or unusual buffer overflow exploit signatures. 7. Consider replacing Tenda AC20 devices with alternative hardware if timely patching is not feasible. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T10:47:14.703Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a8851c118c0da2e55dfa0

Added to database: 11/17/2025, 2:28:33 AM

Last enriched: 11/17/2025, 2:43:23 AM

Last updated: 11/17/2025, 5:29:35 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats