CVE-2025-14656: Buffer Overflow in Tenda AC20
A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-14656 is a buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the HTTP daemon (httpd) component, specifically within the /goform/openSchedWifi endpoint. This endpoint processes scheduling parameters for Wi-Fi operation, including schedStartTime and schedEndTime. Improper input validation or bounds checking on these parameters allows an attacker to craft malicious HTTP requests that overflow the buffer allocated for these inputs. This overflow can corrupt adjacent memory, potentially enabling remote code execution with elevated privileges on the device. The attack vector is network-based (AV:N), requiring no authentication (AT:N) or user interaction (UI:N), and has low attack complexity (AC:L). The vulnerability affects the confidentiality, integrity, and availability of the device, as an attacker could execute arbitrary code, disrupt network services, or intercept sensitive data. Although no active exploitation has been reported, the availability of a public exploit increases the urgency for remediation. The vulnerability does not require physical access or user involvement, making it highly exploitable in exposed network environments. The lack of a vendor patch at the time of disclosure necessitates interim mitigations to reduce exposure. This vulnerability is critical for environments relying on Tenda AC20 routers, including home networks, small businesses, and ISPs using these devices as customer premises equipment (CPE).
Potential Impact
For European organizations, exploitation of CVE-2025-14656 could lead to severe consequences including unauthorized remote code execution on network routers, resulting in full compromise of the device. This can enable attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised router as a foothold for lateral movement into internal networks. Confidentiality of sensitive communications could be breached, integrity of network configurations compromised, and availability of network services disrupted. Organizations relying on Tenda AC20 routers for critical infrastructure or customer connectivity face increased risk of operational downtime and data breaches. The public availability of an exploit increases the likelihood of targeted attacks or opportunistic scanning by threat actors. Given the router’s role at the network edge, successful exploitation could undermine perimeter defenses and expose internal systems to further compromise. The impact is particularly significant for sectors with stringent data protection requirements under GDPR, as breaches could result in regulatory penalties and reputational damage.
Mitigation Recommendations
1. Immediately restrict external network access to the management interface of Tenda AC20 routers, especially blocking HTTP access to the /goform/openSchedWifi endpoint at the firewall or router level. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the vulnerable endpoint to detect potential exploitation attempts. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of identifying buffer overflow attempts against this vulnerability. 4. Isolate vulnerable devices on segmented networks to limit potential lateral movement if compromised. 5. Engage with Tenda support channels to obtain and apply official firmware updates as soon as they become available. 6. In the absence of patches, consider temporary replacement of vulnerable devices with alternative hardware or firmware versions not affected by this issue. 7. Educate network administrators about the vulnerability and ensure strict access controls and strong authentication mechanisms are in place for device management. 8. Conduct regular vulnerability scans and penetration tests focusing on network edge devices to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14656: Buffer Overflow in Tenda AC20
Description
A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14656 is a buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The vulnerability resides in the HTTP daemon (httpd) component, specifically within the /goform/openSchedWifi endpoint. This endpoint processes scheduling parameters for Wi-Fi operation, including schedStartTime and schedEndTime. Improper input validation or bounds checking on these parameters allows an attacker to craft malicious HTTP requests that overflow the buffer allocated for these inputs. This overflow can corrupt adjacent memory, potentially enabling remote code execution with elevated privileges on the device. The attack vector is network-based (AV:N), requiring no authentication (AT:N) or user interaction (UI:N), and has low attack complexity (AC:L). The vulnerability affects the confidentiality, integrity, and availability of the device, as an attacker could execute arbitrary code, disrupt network services, or intercept sensitive data. Although no active exploitation has been reported, the availability of a public exploit increases the urgency for remediation. The vulnerability does not require physical access or user involvement, making it highly exploitable in exposed network environments. The lack of a vendor patch at the time of disclosure necessitates interim mitigations to reduce exposure. This vulnerability is critical for environments relying on Tenda AC20 routers, including home networks, small businesses, and ISPs using these devices as customer premises equipment (CPE).
Potential Impact
For European organizations, exploitation of CVE-2025-14656 could lead to severe consequences including unauthorized remote code execution on network routers, resulting in full compromise of the device. This can enable attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised router as a foothold for lateral movement into internal networks. Confidentiality of sensitive communications could be breached, integrity of network configurations compromised, and availability of network services disrupted. Organizations relying on Tenda AC20 routers for critical infrastructure or customer connectivity face increased risk of operational downtime and data breaches. The public availability of an exploit increases the likelihood of targeted attacks or opportunistic scanning by threat actors. Given the router’s role at the network edge, successful exploitation could undermine perimeter defenses and expose internal systems to further compromise. The impact is particularly significant for sectors with stringent data protection requirements under GDPR, as breaches could result in regulatory penalties and reputational damage.
Mitigation Recommendations
1. Immediately restrict external network access to the management interface of Tenda AC20 routers, especially blocking HTTP access to the /goform/openSchedWifi endpoint at the firewall or router level. 2. Monitor network traffic for unusual or malformed HTTP requests targeting the vulnerable endpoint to detect potential exploitation attempts. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of identifying buffer overflow attempts against this vulnerability. 4. Isolate vulnerable devices on segmented networks to limit potential lateral movement if compromised. 5. Engage with Tenda support channels to obtain and apply official firmware updates as soon as they become available. 6. In the absence of patches, consider temporary replacement of vulnerable devices with alternative hardware or firmware versions not affected by this issue. 7. Educate network administrators about the vulnerability and ensure strict access controls and strong authentication mechanisms are in place for device management. 8. Conduct regular vulnerability scans and penetration tests focusing on network edge devices to identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T09:49:20.336Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693e9ba865369625b09f1b21
Added to database: 12/14/2025, 11:12:40 AM
Last enriched: 12/21/2025, 12:00:45 PM
Last updated: 2/7/2026, 11:37:19 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.