CVE-2025-14992: Stack-based Buffer Overflow in Tenda AC18
A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-14992 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.05. The vulnerability exists in the HTTP request handler component, specifically in the /goform/GetParentControlInfo endpoint. The root cause is the unsafe use of the strcpy function to copy the 'mac' parameter without proper bounds checking, leading to a stack buffer overflow when a specially crafted input is sent. This overflow can overwrite the stack, allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requires no user interaction (UI:N), and no authentication (AT:N), making it highly exploitable. The CVSS 4.0 vector indicates low attack complexity (AC:L) but requires low privileges (PR:L), suggesting that an attacker with limited access can exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of attacks. The vulnerability affects only the specified firmware version, and no patch links are currently available, indicating that mitigation options may be limited to network controls or vendor updates once released. The flaw poses a significant risk to networks relying on Tenda AC18 routers, potentially enabling attackers to gain control over the device, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability presents a significant risk due to the potential for remote code execution on network routers, which are critical infrastructure components. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, pivot into internal networks, deploy malware, or cause denial of service. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators using Tenda AC18 devices. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the threat landscape. Additionally, the public availability of exploit code may lead to rapid weaponization by cybercriminals or state-sponsored actors. The impact extends beyond individual organizations to potentially affect supply chains and national security, especially in sectors relying on secure and stable network connectivity.
Mitigation Recommendations
1. Immediate identification and inventory of all Tenda AC18 routers running firmware version 15.03.05.05 within the network. 2. Contact Tenda for official firmware updates or security patches addressing CVE-2025-14992; apply updates as soon as they become available. 3. Until patches are available, implement network-level protections such as firewall rules to block or restrict access to the /goform/GetParentControlInfo endpoint or the router's management interface from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical assets and limit lateral movement in case of compromise. 5. Monitor network traffic for unusual or malformed HTTP requests targeting the router's management endpoints. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving router compromise. 8. Consider temporary replacement or removal of vulnerable devices in high-risk environments if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14992: Stack-based Buffer Overflow in Tenda AC18
Description
A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14992 is a stack-based buffer overflow vulnerability identified in the Tenda AC18 router firmware version 15.03.05.05. The vulnerability exists in the HTTP request handler component, specifically in the /goform/GetParentControlInfo endpoint. The root cause is the unsafe use of the strcpy function to copy the 'mac' parameter without proper bounds checking, leading to a stack buffer overflow when a specially crafted input is sent. This overflow can overwrite the stack, allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requires no user interaction (UI:N), and no authentication (AT:N), making it highly exploitable. The CVSS 4.0 vector indicates low attack complexity (AC:L) but requires low privileges (PR:L), suggesting that an attacker with limited access can exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of attacks. The vulnerability affects only the specified firmware version, and no patch links are currently available, indicating that mitigation options may be limited to network controls or vendor updates once released. The flaw poses a significant risk to networks relying on Tenda AC18 routers, potentially enabling attackers to gain control over the device, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability presents a significant risk due to the potential for remote code execution on network routers, which are critical infrastructure components. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, pivot into internal networks, deploy malware, or cause denial of service. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators using Tenda AC18 devices. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the threat landscape. Additionally, the public availability of exploit code may lead to rapid weaponization by cybercriminals or state-sponsored actors. The impact extends beyond individual organizations to potentially affect supply chains and national security, especially in sectors relying on secure and stable network connectivity.
Mitigation Recommendations
1. Immediate identification and inventory of all Tenda AC18 routers running firmware version 15.03.05.05 within the network. 2. Contact Tenda for official firmware updates or security patches addressing CVE-2025-14992; apply updates as soon as they become available. 3. Until patches are available, implement network-level protections such as firewall rules to block or restrict access to the /goform/GetParentControlInfo endpoint or the router's management interface from untrusted networks. 4. Employ network segmentation to isolate vulnerable devices from critical assets and limit lateral movement in case of compromise. 5. Monitor network traffic for unusual or malformed HTTP requests targeting the router's management endpoints. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving router compromise. 8. Consider temporary replacement or removal of vulnerable devices in high-risk environments if patching is delayed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-20T08:04:28.940Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69477456daa649f7237d58f6
Added to database: 12/21/2025, 4:15:18 AM
Last enriched: 12/21/2025, 4:30:14 AM
Last updated: 2/6/2026, 2:23:37 AM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.