CVE-2025-13445: Stack-based Buffer Overflow in Tenda AC21
A flaw has been found in Tenda AC21 16.03.08.16. This affects an unknown part of the file /goform/SetIpMacBind. Executing manipulation of the argument list can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-13445 is a stack-based buffer overflow vulnerability identified in the Tenda AC21 router firmware version 16.03.08.16. The vulnerability resides in the /goform/SetIpMacBind endpoint, which handles IP and MAC binding configurations. By manipulating the argument list sent to this endpoint, an attacker can overflow a stack buffer, leading to memory corruption. This corruption can be leveraged to execute arbitrary code on the device with elevated privileges, potentially allowing full control over the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (network vector, low complexity), no privileges required, and the high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, proof-of-concept exploit code has been published, increasing the likelihood of active exploitation. The vulnerability affects a widely deployed consumer and small business router model, which often serves as a gateway device, making exploitation a critical threat to network security. The lack of available patches at the time of publication necessitates immediate mitigation through network-level controls and monitoring.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Tenda AC21 routers, enabling attackers to intercept, modify, or redirect network traffic, disrupt internet connectivity, or use the device as a foothold for further attacks within the internal network. This could result in data breaches, loss of service, and exposure of sensitive information. Small and medium enterprises, as well as home office environments relying on these routers, are particularly vulnerable due to limited IT security resources. Critical infrastructure sectors using these devices for network connectivity could face operational disruptions. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in countries with higher market penetration of Tenda products. The published exploit code may accelerate attack campaigns targeting vulnerable devices across Europe.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface, especially from untrusted networks, using firewall rules or network segmentation. 2. Disable or limit the IP-MAC binding feature if not required, reducing the attack surface. 3. Monitor network traffic for unusual activity targeting the /goform/SetIpMacBind endpoint or signs of exploitation attempts. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 5. Regularly check for and apply firmware updates from Tenda as soon as patches addressing CVE-2025-13445 are released. 6. For organizations with large deployments, consider replacing vulnerable devices with models from vendors with robust security update policies. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-13445: Stack-based Buffer Overflow in Tenda AC21
Description
A flaw has been found in Tenda AC21 16.03.08.16. This affects an unknown part of the file /goform/SetIpMacBind. Executing manipulation of the argument list can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13445 is a stack-based buffer overflow vulnerability identified in the Tenda AC21 router firmware version 16.03.08.16. The vulnerability resides in the /goform/SetIpMacBind endpoint, which handles IP and MAC binding configurations. By manipulating the argument list sent to this endpoint, an attacker can overflow a stack buffer, leading to memory corruption. This corruption can be leveraged to execute arbitrary code on the device with elevated privileges, potentially allowing full control over the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (network vector, low complexity), no privileges required, and the high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, proof-of-concept exploit code has been published, increasing the likelihood of active exploitation. The vulnerability affects a widely deployed consumer and small business router model, which often serves as a gateway device, making exploitation a critical threat to network security. The lack of available patches at the time of publication necessitates immediate mitigation through network-level controls and monitoring.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Tenda AC21 routers, enabling attackers to intercept, modify, or redirect network traffic, disrupt internet connectivity, or use the device as a foothold for further attacks within the internal network. This could result in data breaches, loss of service, and exposure of sensitive information. Small and medium enterprises, as well as home office environments relying on these routers, are particularly vulnerable due to limited IT security resources. Critical infrastructure sectors using these devices for network connectivity could face operational disruptions. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in countries with higher market penetration of Tenda products. The published exploit code may accelerate attack campaigns targeting vulnerable devices across Europe.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface, especially from untrusted networks, using firewall rules or network segmentation. 2. Disable or limit the IP-MAC binding feature if not required, reducing the attack surface. 3. Monitor network traffic for unusual activity targeting the /goform/SetIpMacBind endpoint or signs of exploitation attempts. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 5. Regularly check for and apply firmware updates from Tenda as soon as patches addressing CVE-2025-13445 are released. 6. For organizations with large deployments, consider replacing vulnerable devices with models from vendors with robust security update policies. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T19:14:36.023Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e7b7b1af65083e67f4584
Added to database: 11/20/2025, 2:22:51 AM
Last enriched: 11/20/2025, 2:35:42 AM
Last updated: 11/20/2025, 4:11:37 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighCVE-2025-13443: Improper Access Controls in macrozheng mall
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.