CVE-2025-14286: Information Disclosure in Tenda AC9
A vulnerability was determined in Tenda AC9 15.03.05.14_multi. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/DownloadCfg.jpg of the component Configuration File Handler. This manipulation causes information disclosure. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-14286 is a medium severity information disclosure vulnerability identified in the Tenda AC9 router firmware version 15.03.05.14_multi. The vulnerability resides in an unspecified functionality of the /cgi-bin/DownloadCfg.jpg CGI endpoint, which is part of the Configuration File Handler component. This flaw allows an unauthenticated remote attacker to retrieve sensitive configuration information from the device by sending crafted HTTP requests to this endpoint. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The leaked information could include critical router configuration details such as Wi-Fi credentials, administrative passwords, or network topology data, which could be leveraged to compromise the network further. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial information disclosure (VC:L). Although no confirmed exploits are currently active in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The lack of available patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure. This vulnerability highlights the risks associated with embedded web interfaces in consumer and enterprise networking devices, especially when remote management is enabled without adequate protections.
Potential Impact
For European organizations, the information disclosure vulnerability in Tenda AC9 routers could lead to unauthorized access to sensitive network configuration data. Exposure of Wi-Fi credentials or administrative passwords could allow attackers to infiltrate internal networks, intercept communications, or launch further attacks such as lateral movement or data exfiltration. Organizations relying on these routers for critical connectivity or in branch offices may face increased risk of network compromise. The vulnerability's remote exploitability without authentication means attackers can attempt exploitation from outside the network perimeter if remote management interfaces are exposed. This risk is heightened in environments where default or weak credentials are used, or where network segmentation is insufficient. The potential impact includes loss of confidentiality, erosion of trust in network security, and operational disruptions if attackers leverage the disclosed information to disrupt services. Given the medium severity and the public disclosure of exploit details, European entities using affected devices should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately check for and apply any firmware updates or patches released by Tenda addressing CVE-2025-14286. 2. If patches are not yet available, disable remote management interfaces on the Tenda AC9 routers to prevent external access to the vulnerable CGI endpoint. 3. Restrict access to the router’s web management interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Change default administrative credentials to strong, unique passwords to reduce risk if information is partially disclosed. 5. Implement network segmentation to isolate critical systems from devices running vulnerable firmware, limiting lateral movement opportunities. 6. Monitor network traffic for unusual requests targeting /cgi-bin/DownloadCfg.jpg or other suspicious activity indicative of exploitation attempts. 7. Educate IT staff about this specific vulnerability and ensure incident response plans include steps for detection and containment. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 9. Regularly audit and inventory network devices to identify and track Tenda AC9 routers and their firmware versions for timely remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14286: Information Disclosure in Tenda AC9
Description
A vulnerability was determined in Tenda AC9 15.03.05.14_multi. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/DownloadCfg.jpg of the component Configuration File Handler. This manipulation causes information disclosure. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-14286 is a medium severity information disclosure vulnerability identified in the Tenda AC9 router firmware version 15.03.05.14_multi. The vulnerability resides in an unspecified functionality of the /cgi-bin/DownloadCfg.jpg CGI endpoint, which is part of the Configuration File Handler component. This flaw allows an unauthenticated remote attacker to retrieve sensitive configuration information from the device by sending crafted HTTP requests to this endpoint. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The leaked information could include critical router configuration details such as Wi-Fi credentials, administrative passwords, or network topology data, which could be leveraged to compromise the network further. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial information disclosure (VC:L). Although no confirmed exploits are currently active in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The lack of available patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure. This vulnerability highlights the risks associated with embedded web interfaces in consumer and enterprise networking devices, especially when remote management is enabled without adequate protections.
Potential Impact
For European organizations, the information disclosure vulnerability in Tenda AC9 routers could lead to unauthorized access to sensitive network configuration data. Exposure of Wi-Fi credentials or administrative passwords could allow attackers to infiltrate internal networks, intercept communications, or launch further attacks such as lateral movement or data exfiltration. Organizations relying on these routers for critical connectivity or in branch offices may face increased risk of network compromise. The vulnerability's remote exploitability without authentication means attackers can attempt exploitation from outside the network perimeter if remote management interfaces are exposed. This risk is heightened in environments where default or weak credentials are used, or where network segmentation is insufficient. The potential impact includes loss of confidentiality, erosion of trust in network security, and operational disruptions if attackers leverage the disclosed information to disrupt services. Given the medium severity and the public disclosure of exploit details, European entities using affected devices should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately check for and apply any firmware updates or patches released by Tenda addressing CVE-2025-14286. 2. If patches are not yet available, disable remote management interfaces on the Tenda AC9 routers to prevent external access to the vulnerable CGI endpoint. 3. Restrict access to the router’s web management interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Change default administrative credentials to strong, unique passwords to reduce risk if information is partially disclosed. 5. Implement network segmentation to isolate critical systems from devices running vulnerable firmware, limiting lateral movement opportunities. 6. Monitor network traffic for unusual requests targeting /cgi-bin/DownloadCfg.jpg or other suspicious activity indicative of exploitation attempts. 7. Educate IT staff about this specific vulnerability and ensure incident response plans include steps for detection and containment. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 9. Regularly audit and inventory network devices to identify and track Tenda AC9 routers and their firmware versions for timely remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-08T18:49:39.958Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693783830af42da4c56cfe6a
Added to database: 12/9/2025, 2:03:47 AM
Last enriched: 12/9/2025, 2:19:31 AM
Last updated: 12/11/2025, 3:58:18 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
MediumCVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
MediumCVE-2025-14485: Command Injection in EFM ipTIME A3004T
LowCVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.