Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14286: Information Disclosure in Tenda AC9

0
Medium
VulnerabilityCVE-2025-14286cvecve-2025-14286
Published: Tue Dec 09 2025 (12/09/2025, 01:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC9

Description

A vulnerability was determined in Tenda AC9 15.03.05.14_multi. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/DownloadCfg.jpg of the component Configuration File Handler. This manipulation causes information disclosure. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:19:31 UTC

Technical Analysis

CVE-2025-14286 is a medium severity information disclosure vulnerability identified in the Tenda AC9 router firmware version 15.03.05.14_multi. The vulnerability resides in an unspecified functionality of the /cgi-bin/DownloadCfg.jpg CGI endpoint, which is part of the Configuration File Handler component. This flaw allows an unauthenticated remote attacker to retrieve sensitive configuration information from the device by sending crafted HTTP requests to this endpoint. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The leaked information could include critical router configuration details such as Wi-Fi credentials, administrative passwords, or network topology data, which could be leveraged to compromise the network further. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial information disclosure (VC:L). Although no confirmed exploits are currently active in the wild, the public disclosure of the vulnerability details increases the likelihood of exploitation attempts. The lack of available patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure. This vulnerability highlights the risks associated with embedded web interfaces in consumer and enterprise networking devices, especially when remote management is enabled without adequate protections.

Potential Impact

For European organizations, the information disclosure vulnerability in Tenda AC9 routers could lead to unauthorized access to sensitive network configuration data. Exposure of Wi-Fi credentials or administrative passwords could allow attackers to infiltrate internal networks, intercept communications, or launch further attacks such as lateral movement or data exfiltration. Organizations relying on these routers for critical connectivity or in branch offices may face increased risk of network compromise. The vulnerability's remote exploitability without authentication means attackers can attempt exploitation from outside the network perimeter if remote management interfaces are exposed. This risk is heightened in environments where default or weak credentials are used, or where network segmentation is insufficient. The potential impact includes loss of confidentiality, erosion of trust in network security, and operational disruptions if attackers leverage the disclosed information to disrupt services. Given the medium severity and the public disclosure of exploit details, European entities using affected devices should prioritize mitigation to prevent exploitation.

Mitigation Recommendations

1. Immediately check for and apply any firmware updates or patches released by Tenda addressing CVE-2025-14286. 2. If patches are not yet available, disable remote management interfaces on the Tenda AC9 routers to prevent external access to the vulnerable CGI endpoint. 3. Restrict access to the router’s web management interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Change default administrative credentials to strong, unique passwords to reduce risk if information is partially disclosed. 5. Implement network segmentation to isolate critical systems from devices running vulnerable firmware, limiting lateral movement opportunities. 6. Monitor network traffic for unusual requests targeting /cgi-bin/DownloadCfg.jpg or other suspicious activity indicative of exploitation attempts. 7. Educate IT staff about this specific vulnerability and ensure incident response plans include steps for detection and containment. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 9. Regularly audit and inventory network devices to identify and track Tenda AC9 routers and their firmware versions for timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-08T18:49:39.958Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693783830af42da4c56cfe6a

Added to database: 12/9/2025, 2:03:47 AM

Last enriched: 12/9/2025, 2:19:31 AM

Last updated: 12/11/2025, 3:58:18 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats