Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14655: Stack-based Buffer Overflow in Tenda AC20

0
High
VulnerabilityCVE-2025-14655cvecve-2025-14655
Published: Sun Dec 14 2025 (12/14/2025, 10:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted element is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg of the component httpd. Performing manipulation of the argument rebootTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/14/2025, 10:57:35 UTC

Technical Analysis

CVE-2025-14655 is a stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the formSetRebootTimer function, specifically in the /goform/SetSysAutoRebbotCfg HTTP endpoint handled by the router's embedded HTTP daemon (httpd). The flaw is triggered by sending a specially crafted rebootTime parameter that exceeds the buffer size allocated on the stack, causing a buffer overflow. This overflow can overwrite the stack memory, potentially allowing an attacker to execute arbitrary code with the privileges of the httpd process. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full compromise of the device, network disruption, or use as a pivot point for further attacks. Although no confirmed exploits in the wild have been reported, the public release of an exploit increases the likelihood of active exploitation. The lack of an official patch or firmware update at the time of disclosure further exacerbates the risk. The vulnerability affects a widely deployed consumer and small business router model, which is often used in home and office environments, potentially exposing a large attack surface.

Potential Impact

For European organizations, exploitation of CVE-2025-14655 could lead to severe consequences including unauthorized remote code execution on network routers, resulting in loss of network availability, interception or manipulation of network traffic, and potential lateral movement within corporate networks. This could compromise sensitive data confidentiality and integrity, disrupt business operations, and facilitate further attacks such as ransomware or espionage. Small and medium enterprises relying on Tenda AC20 devices for internet connectivity or network segmentation are particularly vulnerable. The public availability of an exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns. Critical infrastructure sectors that depend on reliable network equipment may face operational disruptions. Additionally, the vulnerability could be leveraged to create botnets or launch distributed denial-of-service (DDoS) attacks, impacting broader internet stability in Europe.

Mitigation Recommendations

Immediate mitigation should focus on isolating vulnerable Tenda AC20 devices from untrusted networks by restricting access to the /goform/SetSysAutoRebbotCfg endpoint via firewall rules or network segmentation. Network administrators should implement strict access controls to management interfaces, preferably limiting them to trusted internal networks or VPNs. Monitoring network traffic for unusual POST requests targeting the rebootTime parameter can help detect exploitation attempts. Since no official patch is currently available, organizations should consider replacing affected devices with updated models or alternative vendors with timely security support. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide additional protection. Regularly auditing network devices for firmware versions and applying updates as soon as they become available is critical. Finally, educating staff about the risks of exposed network devices and enforcing strong network perimeter defenses will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T09:48:13.345Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693e949f65369625b096c0b2

Added to database: 12/14/2025, 10:42:39 AM

Last enriched: 12/14/2025, 10:57:35 AM

Last updated: 12/14/2025, 8:27:39 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats