CVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-14654 is a stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the formSetPPTPUserList function, which processes requests to the /goform/setPptpUserList endpoint handled by the embedded HTTP server (httpd). Specifically, improper handling and validation of input arguments in this function allow an attacker to overflow the stack buffer by sending a specially crafted request. This overflow can corrupt the stack, potentially enabling remote code execution or denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects the ease of exploitation (network attack vector, low complexity) and the high impact on confidentiality, integrity, and availability. Although no active exploitation has been observed in the wild, a public exploit is available, increasing the likelihood of attacks. The vulnerability affects only the specified firmware version 16.03.08.12 of the Tenda AC20 router, a device commonly used in small to medium business and home networks. The lack of an official patch or update link in the provided data suggests that mitigation may currently rely on network-level protections or firmware updates from the vendor once available.
Potential Impact
For European organizations, exploitation of CVE-2025-14654 could lead to severe consequences including unauthorized remote code execution on affected routers, enabling attackers to intercept, modify, or disrupt network traffic. This compromises confidentiality by exposing sensitive data, integrity by allowing manipulation of communications, and availability by potentially causing router crashes or network outages. Organizations relying on Tenda AC20 devices for VPN or PPTP user management are particularly vulnerable, as the exploited function relates to PPTP user list configuration. Critical infrastructure, SMEs, and enterprises using these routers as part of their network perimeter could face data breaches, lateral movement by attackers, and operational disruptions. The public availability of an exploit increases the risk of opportunistic attacks, including ransomware or espionage campaigns targeting European entities. Additionally, compromised routers could be leveraged as entry points into internal networks or as part of botnets, amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda AC20 routers running firmware version 16.03.08.12. Until an official patch is released by Tenda, network administrators should implement strict access controls to restrict external access to the router’s management interfaces, especially the /goform/setPptpUserList endpoint. Deploy network-level protections such as firewalls or intrusion prevention systems (IPS) to detect and block exploit attempts targeting this vulnerability. Disable PPTP VPN services if not in use, as the vulnerability is related to PPTP user list management. Monitor network traffic for anomalous requests to the affected endpoint and unusual router behavior. Segregate vulnerable devices on isolated network segments to limit potential lateral movement. Regularly check for firmware updates from Tenda and apply patches promptly once available. Consider replacing affected devices with models from vendors with faster security response times if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
Description
A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14654 is a stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the formSetPPTPUserList function, which processes requests to the /goform/setPptpUserList endpoint handled by the embedded HTTP server (httpd). Specifically, improper handling and validation of input arguments in this function allow an attacker to overflow the stack buffer by sending a specially crafted request. This overflow can corrupt the stack, potentially enabling remote code execution or denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects the ease of exploitation (network attack vector, low complexity) and the high impact on confidentiality, integrity, and availability. Although no active exploitation has been observed in the wild, a public exploit is available, increasing the likelihood of attacks. The vulnerability affects only the specified firmware version 16.03.08.12 of the Tenda AC20 router, a device commonly used in small to medium business and home networks. The lack of an official patch or update link in the provided data suggests that mitigation may currently rely on network-level protections or firmware updates from the vendor once available.
Potential Impact
For European organizations, exploitation of CVE-2025-14654 could lead to severe consequences including unauthorized remote code execution on affected routers, enabling attackers to intercept, modify, or disrupt network traffic. This compromises confidentiality by exposing sensitive data, integrity by allowing manipulation of communications, and availability by potentially causing router crashes or network outages. Organizations relying on Tenda AC20 devices for VPN or PPTP user management are particularly vulnerable, as the exploited function relates to PPTP user list configuration. Critical infrastructure, SMEs, and enterprises using these routers as part of their network perimeter could face data breaches, lateral movement by attackers, and operational disruptions. The public availability of an exploit increases the risk of opportunistic attacks, including ransomware or espionage campaigns targeting European entities. Additionally, compromised routers could be leveraged as entry points into internal networks or as part of botnets, amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda AC20 routers running firmware version 16.03.08.12. Until an official patch is released by Tenda, network administrators should implement strict access controls to restrict external access to the router’s management interfaces, especially the /goform/setPptpUserList endpoint. Deploy network-level protections such as firewalls or intrusion prevention systems (IPS) to detect and block exploit attempts targeting this vulnerability. Disable PPTP VPN services if not in use, as the vulnerability is related to PPTP user list management. Monitor network traffic for anomalous requests to the affected endpoint and unusual router behavior. Segregate vulnerable devices on isolated network segments to limit potential lateral movement. Regularly check for firmware updates from Tenda and apply patches promptly once available. Consider replacing affected devices with models from vendors with faster security response times if patching is delayed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T09:48:02.488Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693e9015f795bf52904ccd6e
Added to database: 12/14/2025, 10:23:17 AM
Last enriched: 12/21/2025, 10:49:59 AM
Last updated: 2/4/2026, 11:38:01 PM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2026-1895: Improper Access Controls in WeKan
MediumCVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os
MediumCVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighCVE-2026-1894: Improper Authorization in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.