CVE-2025-52221: n/a
Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm function via the funcname, funcpara1, and funcpara2 parameters.
AI Analysis
Technical Summary
CVE-2025-52221 identifies a buffer overflow vulnerability in the Tenda AC6 router firmware 15.03.05.16_multi. The flaw exists in the formSetCfm function and can be triggered by manipulating the funcname, funcpara1, and funcpara2 parameters. The vulnerability was published on April 8, 2026, but no CVSS score or remediation details have been provided. The vulnerability is not related to a cloud service and no exploits are currently known.
Potential Impact
A buffer overflow vulnerability could potentially allow an attacker to cause a denial of service or execute arbitrary code on the affected device. However, without further details or known exploits, the exact impact remains unclear.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or workaround has been documented at this time.
CVE-2025-52221: n/a
Description
Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm function via the funcname, funcpara1, and funcpara2 parameters.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-52221 identifies a buffer overflow vulnerability in the Tenda AC6 router firmware 15.03.05.16_multi. The flaw exists in the formSetCfm function and can be triggered by manipulating the funcname, funcpara1, and funcpara2 parameters. The vulnerability was published on April 8, 2026, but no CVSS score or remediation details have been provided. The vulnerability is not related to a cloud service and no exploits are currently known.
Potential Impact
A buffer overflow vulnerability could potentially allow an attacker to cause a denial of service or execute arbitrary code on the affected device. However, without further details or known exploits, the exact impact remains unclear.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or workaround has been documented at this time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d737011cc7ad14da41948f
Added to database: 4/9/2026, 5:20:01 AM
Last enriched: 4/9/2026, 5:25:06 AM
Last updated: 4/10/2026, 5:42:58 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.