CVE-2025-4299: Buffer Overflow in Tenda AC1206
A vulnerability was found in Tenda AC1206 up to 15.03.06.23. It has been rated as critical. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4299 is a critical buffer overflow vulnerability identified in the Tenda AC1206 wireless router firmware versions up to 15.03.06.23. The flaw resides in the function setSchedWifi within the /goform/openSchedWifi endpoint. This function is responsible for scheduling Wi-Fi operations, and improper input validation allows an attacker to overflow a buffer by sending crafted requests to this endpoint. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The CVSS 4.0 base score is 8.7 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known to be actively used in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects a wide range of firmware versions, indicating that many deployed devices remain vulnerable unless updated. Given the critical nature of the flaw and the widespread use of Tenda AC1206 routers in home and small business environments, this vulnerability poses a significant security risk.
Potential Impact
For European organizations, the exploitation of CVE-2025-4299 could have severe consequences. Compromised Tenda AC1206 routers could serve as entry points into corporate or home networks, enabling attackers to intercept sensitive communications, deploy malware, or pivot to other internal systems. The loss of confidentiality could expose personal and business data, while integrity and availability impacts could disrupt network services, causing operational downtime. Small and medium enterprises (SMEs) and home offices relying on these routers may be particularly vulnerable due to limited IT security resources and delayed patch deployment. Additionally, the ability to execute code remotely without authentication increases the risk of widespread automated attacks, potentially leading to large-scale botnet formation or ransomware campaigns targeting European networks. The vulnerability also raises privacy concerns, as attackers could manipulate network traffic or exfiltrate data. Given the criticality and ease of exploitation, European organizations using Tenda AC1206 devices must prioritize mitigation to prevent potential breaches and service disruptions.
Mitigation Recommendations
To mitigate CVE-2025-4299 effectively, European organizations should first identify all Tenda AC1206 devices within their networks and verify firmware versions. Immediate steps include: 1) Applying vendor-provided firmware updates once available; if no patch is currently released, monitor Tenda's official channels closely for updates. 2) Restricting remote management access to the router by disabling WAN-side administration or limiting it to trusted IP addresses to reduce exposure. 3) Implementing network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting /goform/openSchedWifi. 5) Encouraging users to change default credentials and use strong passwords to reduce the risk of secondary compromise. 6) Conducting regular network traffic monitoring for anomalous activity indicative of exploitation attempts. 7) Considering replacement of devices that cannot be patched promptly, especially in high-risk environments. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-4299: Buffer Overflow in Tenda AC1206
Description
A vulnerability was found in Tenda AC1206 up to 15.03.06.23. It has been rated as critical. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4299 is a critical buffer overflow vulnerability identified in the Tenda AC1206 wireless router firmware versions up to 15.03.06.23. The flaw resides in the function setSchedWifi within the /goform/openSchedWifi endpoint. This function is responsible for scheduling Wi-Fi operations, and improper input validation allows an attacker to overflow a buffer by sending crafted requests to this endpoint. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The CVSS 4.0 base score is 8.7 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known to be actively used in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects a wide range of firmware versions, indicating that many deployed devices remain vulnerable unless updated. Given the critical nature of the flaw and the widespread use of Tenda AC1206 routers in home and small business environments, this vulnerability poses a significant security risk.
Potential Impact
For European organizations, the exploitation of CVE-2025-4299 could have severe consequences. Compromised Tenda AC1206 routers could serve as entry points into corporate or home networks, enabling attackers to intercept sensitive communications, deploy malware, or pivot to other internal systems. The loss of confidentiality could expose personal and business data, while integrity and availability impacts could disrupt network services, causing operational downtime. Small and medium enterprises (SMEs) and home offices relying on these routers may be particularly vulnerable due to limited IT security resources and delayed patch deployment. Additionally, the ability to execute code remotely without authentication increases the risk of widespread automated attacks, potentially leading to large-scale botnet formation or ransomware campaigns targeting European networks. The vulnerability also raises privacy concerns, as attackers could manipulate network traffic or exfiltrate data. Given the criticality and ease of exploitation, European organizations using Tenda AC1206 devices must prioritize mitigation to prevent potential breaches and service disruptions.
Mitigation Recommendations
To mitigate CVE-2025-4299 effectively, European organizations should first identify all Tenda AC1206 devices within their networks and verify firmware versions. Immediate steps include: 1) Applying vendor-provided firmware updates once available; if no patch is currently released, monitor Tenda's official channels closely for updates. 2) Restricting remote management access to the router by disabling WAN-side administration or limiting it to trusted IP addresses to reduce exposure. 3) Implementing network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting /goform/openSchedWifi. 5) Encouraging users to change default credentials and use strong passwords to reduce the risk of secondary compromise. 6) Conducting regular network traffic monitoring for anomalous activity indicative of exploitation attempts. 7) Considering replacement of devices that cannot be patched promptly, especially in high-risk environments. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-05T12:22:23.778Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbdaa29
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/6/2025, 7:10:51 PM
Last updated: 8/15/2025, 12:54:13 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.