CVE-2025-4810: Stack-based Buffer Overflow in Tenda AC7
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. Affected by this vulnerability is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument reboot_time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4810 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The flaw resides in the function formSetRebootTimer within the /goform/SetRebootTimer endpoint. Specifically, the vulnerability arises from improper handling of the reboot_time argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects the high severity, with metrics indicating network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploit is currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability affects only the specified firmware version 15.03.06.44 of the Tenda AC7 router, a consumer-grade networking device commonly used for home and small office internet connectivity. The lack of an official patch link suggests that a fix may not yet be available, emphasizing the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small businesses and home office setups relying on Tenda AC7 routers. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially pivot to internal networks, compromising sensitive data and disrupting operations. The high impact on confidentiality, integrity, and availability means that data breaches, network outages, and persistent unauthorized access are plausible consequences. Given the remote exploitability without authentication, attackers can launch attacks from anywhere, increasing the threat surface. Critical infrastructure or organizations with less mature network security practices that use these routers as part of their network perimeter are particularly vulnerable. Additionally, the public disclosure of exploit code increases the likelihood of automated attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating Tenda AC7 routers running firmware version 15.03.06.44 from untrusted networks and restricting access to the /goform/SetRebootTimer endpoint via firewall rules or network segmentation. Network administrators should monitor router logs for suspicious requests targeting the reboot_time parameter. Since no official patch is currently available, organizations should consider temporary replacement of affected devices with alternative hardware or downgrade to a known secure firmware version if feasible. Enabling network-level intrusion detection systems (IDS) to detect buffer overflow attempts and blocking suspicious traffic patterns can reduce risk. Users should subscribe to Tenda’s security advisories for updates and apply firmware patches immediately upon release. Additionally, disabling remote management features on these routers can reduce exposure. Regular network scans to identify vulnerable devices and prompt remediation are recommended.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4810: Stack-based Buffer Overflow in Tenda AC7
Description
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. Affected by this vulnerability is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument reboot_time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4810 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC7 router firmware version 15.03.06.44. The flaw resides in the function formSetRebootTimer within the /goform/SetRebootTimer endpoint. Specifically, the vulnerability arises from improper handling of the reboot_time argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS v4.0 score of 8.7 reflects the high severity, with metrics indicating network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploit is currently known to be actively used in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The vulnerability affects only the specified firmware version 15.03.06.44 of the Tenda AC7 router, a consumer-grade networking device commonly used for home and small office internet connectivity. The lack of an official patch link suggests that a fix may not yet be available, emphasizing the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small businesses and home office setups relying on Tenda AC7 routers. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially pivot to internal networks, compromising sensitive data and disrupting operations. The high impact on confidentiality, integrity, and availability means that data breaches, network outages, and persistent unauthorized access are plausible consequences. Given the remote exploitability without authentication, attackers can launch attacks from anywhere, increasing the threat surface. Critical infrastructure or organizations with less mature network security practices that use these routers as part of their network perimeter are particularly vulnerable. Additionally, the public disclosure of exploit code increases the likelihood of automated attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating Tenda AC7 routers running firmware version 15.03.06.44 from untrusted networks and restricting access to the /goform/SetRebootTimer endpoint via firewall rules or network segmentation. Network administrators should monitor router logs for suspicious requests targeting the reboot_time parameter. Since no official patch is currently available, organizations should consider temporary replacement of affected devices with alternative hardware or downgrade to a known secure firmware version if feasible. Enabling network-level intrusion detection systems (IDS) to detect buffer overflow attempts and blocking suspicious traffic patterns can reduce risk. Users should subscribe to Tenda’s security advisories for updates and apply firmware patches immediately upon release. Additionally, disabling remote management features on these routers can reduce exposure. Regular network scans to identify vulnerable devices and prompt remediation are recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-16T08:44:12.481Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeba42
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 9:19:32 PM
Last updated: 8/9/2025, 2:43:30 PM
Views: 15
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.