Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14992: Stack-based Buffer Overflow in Tenda AC18

0
High
VulnerabilityCVE-2025-14992cvecve-2025-14992
Published: Sun Dec 21 2025 (12/21/2025, 04:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 12/21/2025, 04:30:14 UTC

Technical Analysis

CVE-2025-14992 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.05. The vulnerability exists in the HTTP request handler component, specifically in the /goform/GetParentControlInfo endpoint. The root cause is the unsafe use of the strcpy function to copy the 'mac' parameter without proper bounds checking, leading to a stack buffer overflow when a specially crafted input is sent. This overflow can overwrite the stack, allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requires no user interaction (UI:N), and no authentication (AT:N), making it highly exploitable. The CVSS 4.0 vector indicates low attack complexity (AC:L) but requires low privileges (PR:L), suggesting that an attacker with limited access can exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of attacks. The vulnerability affects only the specified firmware version, and no patch links are currently available, indicating that mitigation options may be limited to network controls or vendor updates once released. The flaw poses a significant risk to networks relying on Tenda AC18 routers, potentially enabling attackers to gain control over the device, intercept or manipulate traffic, or disrupt network services.

Potential Impact

For European organizations, this vulnerability presents a significant risk due to the potential for remote code execution on network routers, which are critical infrastructure components. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, pivot into internal networks, deploy malware, or cause denial of service. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators using Tenda AC18 devices. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the threat landscape. Additionally, the public availability of exploit code may lead to rapid weaponization by cybercriminals or state-sponsored actors. The impact extends beyond individual organizations to potentially affect supply chains and national security, especially in sectors relying on secure and stable network connectivity.

Mitigation Recommendations

1. Immediate identification and inventory of all Tenda AC18 routers running firmware version 15.03.05.05 within the network. 2. Contact Tenda for official firmware updates or security patches addressing CVE-2025-14992; apply updates as soon as they become available. 3. Until patches are available, implement network-level protections such as firewall rules to block or restrict access to the /goform/GetParentControlInfo endpoint or the router's management interface from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical assets and limit lateral movement in case of compromise. 5. Monitor network traffic for unusual or malformed HTTP requests targeting the router's management endpoints. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving router compromise. 8. Consider temporary replacement or removal of vulnerable devices in high-risk environments if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-20T08:04:28.940Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69477456daa649f7237d58f6

Added to database: 12/21/2025, 4:15:18 AM

Last enriched: 12/21/2025, 4:30:14 AM

Last updated: 2/6/2026, 2:23:37 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats