Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13445: Stack-based Buffer Overflow in Tenda AC21

0
High
VulnerabilityCVE-2025-13445cvecve-2025-13445
Published: Thu Nov 20 2025 (11/20/2025, 02:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC21

Description

A flaw has been found in Tenda AC21 16.03.08.16. This affects an unknown part of the file /goform/SetIpMacBind. Executing manipulation of the argument list can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/20/2025, 02:35:42 UTC

Technical Analysis

CVE-2025-13445 is a stack-based buffer overflow vulnerability identified in the Tenda AC21 router firmware version 16.03.08.16. The vulnerability resides in the /goform/SetIpMacBind endpoint, which handles IP and MAC binding configurations. By manipulating the argument list sent to this endpoint, an attacker can overflow a stack buffer, leading to memory corruption. This corruption can be leveraged to execute arbitrary code on the device with elevated privileges, potentially allowing full control over the router. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (network vector, low complexity), no privileges required, and the high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild have been reported, proof-of-concept exploit code has been published, increasing the likelihood of active exploitation. The vulnerability affects a widely deployed consumer and small business router model, which often serves as a gateway device, making exploitation a critical threat to network security. The lack of available patches at the time of publication necessitates immediate mitigation through network-level controls and monitoring.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Tenda AC21 routers, enabling attackers to intercept, modify, or redirect network traffic, disrupt internet connectivity, or use the device as a foothold for further attacks within the internal network. This could result in data breaches, loss of service, and exposure of sensitive information. Small and medium enterprises, as well as home office environments relying on these routers, are particularly vulnerable due to limited IT security resources. Critical infrastructure sectors using these devices for network connectivity could face operational disruptions. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in countries with higher market penetration of Tenda products. The published exploit code may accelerate attack campaigns targeting vulnerable devices across Europe.

Mitigation Recommendations

1. Immediately restrict remote access to the router’s management interface, especially from untrusted networks, using firewall rules or network segmentation. 2. Disable or limit the IP-MAC binding feature if not required, reducing the attack surface. 3. Monitor network traffic for unusual activity targeting the /goform/SetIpMacBind endpoint or signs of exploitation attempts. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 5. Regularly check for and apply firmware updates from Tenda as soon as patches addressing CVE-2025-13445 are released. 6. For organizations with large deployments, consider replacing vulnerable devices with models from vendors with robust security update policies. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T19:14:36.023Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e7b7b1af65083e67f4584

Added to database: 11/20/2025, 2:22:51 AM

Last enriched: 11/20/2025, 2:35:42 AM

Last updated: 11/20/2025, 4:11:37 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats