Skip to main content

CVE-2025-4368: Buffer Overflow in Tenda AC8

High
VulnerabilityCVE-2025-4368cvecve-2025-4368
Published: Tue May 06 2025 (05/06/2025, 15:31:08 UTC)
Source: CVE
Vendor/Project: Tenda
Product: AC8

Description

A vulnerability, which was classified as critical, was found in Tenda AC8 16.03.34.06. Affected is the function formGetRouterStatus of the file /goform/MtuSetMacWan. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:09:31 UTC

Technical Analysis

CVE-2025-4368 is a critical buffer overflow vulnerability identified in the Tenda AC8 router, specifically in firmware version 16.03.34.06. The flaw exists in the function formGetRouterStatus within the /goform/MtuSetMacWan endpoint. An attacker can manipulate the 'shareSpeed' argument to trigger a buffer overflow condition. This vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability with high severity, as it can potentially allow remote code execution or denial of service. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The CVSS 4.0 score of 8.7 reflects the high impact and ease of exploitation. The absence of patches at the time of disclosure means affected users remain vulnerable. This vulnerability targets a widely used consumer and small office/home office (SOHO) router model, which is often deployed in environments with limited security monitoring, increasing the risk of compromise.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office users relying on the Tenda AC8 router for internet connectivity. Exploitation could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network availability. This could facilitate lateral movement within corporate networks, data exfiltration, or deployment of malware. Given the router's role as a network gateway, compromise could undermine perimeter defenses and expose connected devices to further attacks. Critical infrastructure or organizations with remote workforces using vulnerable routers may face increased risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, potentially enabling automated exploitation campaigns targeting European networks.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating the vulnerable Tenda AC8 devices from critical network segments to limit potential impact. 2. Network administrators should monitor traffic to and from the /goform/MtuSetMacWan endpoint for anomalous requests, particularly those manipulating the 'shareSpeed' parameter. 3. Deploy network-based intrusion detection/prevention systems (IDS/IPS) with custom signatures targeting this exploit pattern. 4. Encourage users to upgrade firmware once Tenda releases a patch; until then, consider replacing vulnerable devices with models from vendors with timely security updates. 5. Implement network segmentation to reduce exposure of vulnerable routers to untrusted networks. 6. Enforce strict access controls on router management interfaces, restricting remote access where possible. 7. Conduct regular vulnerability scans to identify presence of affected firmware versions within organizational networks. 8. Educate users about the risks of using outdated router firmware and the importance of applying security updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-05T19:06:35.443Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda4c2

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:09:31 PM

Last updated: 8/15/2025, 6:47:31 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats