CVE-2025-4896: Buffer Overflow in Tenda AC10
A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/UserCongratulationsExec. The manipulation of the argument getuid leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4896 is a critical buffer overflow vulnerability identified in the Tenda AC10 router, specifically affecting firmware version 16.03.10.13. The vulnerability arises from improper handling of the 'getuid' argument in the /goform/UserCongratulationsExec endpoint. This flaw allows an attacker to manipulate input parameters to overflow a buffer, potentially overwriting adjacent memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS 4.0 base score of 8.7 reflects high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact metrics indicate high confidentiality, integrity, and availability impacts, meaning successful exploitation could lead to full compromise of the device. Although no public exploits have been observed in the wild yet, the disclosure of the exploit code increases the likelihood of active exploitation. The Tenda AC10 is a widely used consumer-grade wireless router, and such vulnerabilities can be leveraged to gain persistent access to internal networks, intercept or manipulate traffic, or launch further attacks against connected devices. The absence of an official patch at the time of disclosure further elevates the risk for affected users.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home office environments that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could lead to unauthorized network access, data interception, and lateral movement within corporate networks, potentially compromising sensitive information and disrupting business operations. The high impact on confidentiality, integrity, and availability means attackers could exfiltrate data, inject malicious payloads, or cause denial of service conditions. Given the remote exploitability without authentication, attackers can target vulnerable routers over the internet, increasing the attack surface. This is particularly concerning for organizations with remote workers relying on vulnerable routers for VPN or other secure connections. Additionally, compromised routers can be used as a foothold for launching attacks against critical infrastructure or supply chain partners within Europe, amplifying the threat.
Mitigation Recommendations
Organizations should immediately identify any Tenda AC10 devices running firmware version 16.03.10.13 within their networks. Since no official patch is currently available, interim mitigations include disabling remote management interfaces to prevent external access to the vulnerable endpoint. Network segmentation should be enforced to isolate vulnerable devices from critical assets. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit attempts targeting this vulnerability can help detect and block attacks. Organizations should monitor network traffic for unusual activity originating from or directed to Tenda AC10 devices. Where possible, replace affected devices with models from vendors providing timely security updates. Additionally, users should change default credentials and ensure strong passwords are set to reduce the risk of exploitation. Regular firmware update checks are essential to apply patches once released. Finally, educating users about the risks of using consumer-grade routers in professional environments can help reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4896: Buffer Overflow in Tenda AC10
Description
A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/UserCongratulationsExec. The manipulation of the argument getuid leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4896 is a critical buffer overflow vulnerability identified in the Tenda AC10 router, specifically affecting firmware version 16.03.10.13. The vulnerability arises from improper handling of the 'getuid' argument in the /goform/UserCongratulationsExec endpoint. This flaw allows an attacker to manipulate input parameters to overflow a buffer, potentially overwriting adjacent memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS 4.0 base score of 8.7 reflects high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact metrics indicate high confidentiality, integrity, and availability impacts, meaning successful exploitation could lead to full compromise of the device. Although no public exploits have been observed in the wild yet, the disclosure of the exploit code increases the likelihood of active exploitation. The Tenda AC10 is a widely used consumer-grade wireless router, and such vulnerabilities can be leveraged to gain persistent access to internal networks, intercept or manipulate traffic, or launch further attacks against connected devices. The absence of an official patch at the time of disclosure further elevates the risk for affected users.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home office environments that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could lead to unauthorized network access, data interception, and lateral movement within corporate networks, potentially compromising sensitive information and disrupting business operations. The high impact on confidentiality, integrity, and availability means attackers could exfiltrate data, inject malicious payloads, or cause denial of service conditions. Given the remote exploitability without authentication, attackers can target vulnerable routers over the internet, increasing the attack surface. This is particularly concerning for organizations with remote workers relying on vulnerable routers for VPN or other secure connections. Additionally, compromised routers can be used as a foothold for launching attacks against critical infrastructure or supply chain partners within Europe, amplifying the threat.
Mitigation Recommendations
Organizations should immediately identify any Tenda AC10 devices running firmware version 16.03.10.13 within their networks. Since no official patch is currently available, interim mitigations include disabling remote management interfaces to prevent external access to the vulnerable endpoint. Network segmentation should be enforced to isolate vulnerable devices from critical assets. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit attempts targeting this vulnerability can help detect and block attacks. Organizations should monitor network traffic for unusual activity originating from or directed to Tenda AC10 devices. Where possible, replace affected devices with models from vendors providing timely security updates. Additionally, users should change default credentials and ensure strong passwords are set to reduce the risk of exploitation. Regular firmware update checks are essential to apply patches once released. Finally, educating users about the risks of using consumer-grade routers in professional environments can help reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-17T12:55:03.211Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb7ef
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:19:00 PM
Last updated: 8/16/2025, 7:48:34 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.