Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18

0
High
VulnerabilityCVE-2025-14993cvecve-2025-14993
Published: Sun Dec 21 2025 (12/21/2025, 04:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC18

Description

A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:10:02 UTC

Technical Analysis

CVE-2025-14993 identifies a critical stack-based buffer overflow vulnerability in the Tenda AC18 router firmware version 15.03.05.05. The vulnerability arises from improper handling of the scanList parameter passed to the sprintf function in the /goform/SetDlnaCfg HTTP endpoint, part of the device's HTTP request handler. Because sprintf does not perform bounds checking, a specially crafted scanList argument can overflow the stack buffer, corrupting adjacent memory. This flaw is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to arbitrary code execution with elevated privileges, enabling attackers to take full control of the device, disrupt network operations, or pivot into internal networks. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability. Although no confirmed exploits in the wild are reported, a public exploit is available, increasing the likelihood of active exploitation. The affected product, Tenda AC18, is a widely used consumer and small business router, making this vulnerability relevant to a broad user base. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The impact of CVE-2025-14993 is significant for organizations and individuals using Tenda AC18 routers. Exploitation can lead to complete compromise of the affected device, allowing attackers to execute arbitrary code remotely. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential lateral movement to other connected systems. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by causing device crashes or network outages. Given the router's role as a network gateway, compromised devices can serve as persistent footholds for attackers, facilitating further attacks on organizational infrastructure. The public availability of an exploit increases the risk of widespread attacks, including automated scanning and exploitation campaigns. Organizations relying on Tenda AC18 devices in home offices, small businesses, or branch locations face elevated risks, especially if devices are exposed to the internet without adequate network segmentation or firewall protections.

Mitigation Recommendations

To mitigate CVE-2025-14993, organizations should first check for and apply any official firmware updates or patches released by Tenda addressing this vulnerability. In the absence of patches, network administrators should restrict access to the router's management interfaces by implementing firewall rules that block inbound traffic to the /goform/SetDlnaCfg endpoint or the HTTP management interface from untrusted networks, especially the internet. Disabling remote management features or restricting them to trusted IP addresses can reduce exposure. Network segmentation should be employed to isolate vulnerable devices from critical infrastructure. Monitoring network traffic for unusual requests targeting the scanList parameter or the affected endpoint can help detect exploitation attempts. Additionally, organizations should consider replacing affected devices with models from vendors with more robust security track records if timely patching is not feasible. Regularly updating router firmware and maintaining an inventory of network devices will aid in managing such vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-20T08:04:33.686Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69477b5ddaa649f723885181

Added to database: 12/21/2025, 4:45:17 AM

Last enriched: 2/24/2026, 11:10:02 PM

Last updated: 3/24/2026, 11:05:32 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses