Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20

0
High
VulnerabilityCVE-2025-14654cvecve-2025-14654
Published: Sun Dec 14 2025 (12/14/2025, 10:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 12/21/2025, 10:49:59 UTC

Technical Analysis

CVE-2025-14654 is a stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the formSetPPTPUserList function, which processes requests to the /goform/setPptpUserList endpoint handled by the embedded HTTP server (httpd). Specifically, improper handling and validation of input arguments in this function allow an attacker to overflow the stack buffer by sending a specially crafted request. This overflow can corrupt the stack, potentially enabling remote code execution or denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects the ease of exploitation (network attack vector, low complexity) and the high impact on confidentiality, integrity, and availability. Although no active exploitation has been observed in the wild, a public exploit is available, increasing the likelihood of attacks. The vulnerability affects only the specified firmware version 16.03.08.12 of the Tenda AC20 router, a device commonly used in small to medium business and home networks. The lack of an official patch or update link in the provided data suggests that mitigation may currently rely on network-level protections or firmware updates from the vendor once available.

Potential Impact

For European organizations, exploitation of CVE-2025-14654 could lead to severe consequences including unauthorized remote code execution on affected routers, enabling attackers to intercept, modify, or disrupt network traffic. This compromises confidentiality by exposing sensitive data, integrity by allowing manipulation of communications, and availability by potentially causing router crashes or network outages. Organizations relying on Tenda AC20 devices for VPN or PPTP user management are particularly vulnerable, as the exploited function relates to PPTP user list configuration. Critical infrastructure, SMEs, and enterprises using these routers as part of their network perimeter could face data breaches, lateral movement by attackers, and operational disruptions. The public availability of an exploit increases the risk of opportunistic attacks, including ransomware or espionage campaigns targeting European entities. Additionally, compromised routers could be leveraged as entry points into internal networks or as part of botnets, amplifying the threat landscape.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AC20 routers running firmware version 16.03.08.12. Until an official patch is released by Tenda, network administrators should implement strict access controls to restrict external access to the router’s management interfaces, especially the /goform/setPptpUserList endpoint. Deploy network-level protections such as firewalls or intrusion prevention systems (IPS) to detect and block exploit attempts targeting this vulnerability. Disable PPTP VPN services if not in use, as the vulnerability is related to PPTP user list management. Monitor network traffic for anomalous requests to the affected endpoint and unusual router behavior. Segregate vulnerable devices on isolated network segments to limit potential lateral movement. Regularly check for firmware updates from Tenda and apply patches promptly once available. Consider replacing affected devices with models from vendors with faster security response times if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T09:48:02.488Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693e9015f795bf52904ccd6e

Added to database: 12/14/2025, 10:23:17 AM

Last enriched: 12/21/2025, 10:49:59 AM

Last updated: 2/4/2026, 11:38:01 PM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats