CVE-2025-5795: Buffer Overflow in Tenda AC5
A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5795 is a critical buffer overflow vulnerability identified in the Tenda AC5 router, specifically affecting firmware versions 1.0 and 15.03.06.47. The vulnerability resides in the function 'fromadvsetlanip' within the '/goform/AdvSetLanip' endpoint. The issue arises due to improper handling of the 'lanMask' argument, which can be manipulated by an attacker to overflow a buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been disclosed, increasing the risk of exploitation. The vulnerability's presence in a widely deployed consumer-grade router means that attackers could leverage it to gain control over the device, intercept or manipulate network traffic, or pivot into internal networks, potentially compromising connected systems and data.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the Tenda AC5. Exploitation could lead to unauthorized access to internal networks, data interception, and disruption of network services. Critical infrastructure or organizations relying on these routers for network connectivity could face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit means attackers can target vulnerable devices en masse, potentially leading to widespread compromise. Additionally, given the router's role at the network perimeter, successful exploitation could facilitate lateral movement within corporate networks, threatening confidentiality and integrity of sensitive information. The lack of patches or official updates at the time of disclosure exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda AC5 routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces or restrict access to trusted IP addresses only, reducing exposure to remote exploitation. 3. Monitor network traffic for unusual activity originating from or targeting the router, including unexpected outbound connections or anomalous LAN traffic. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 5. Where possible, replace Tenda AC5 devices with routers from vendors with timely security update practices, especially in sensitive environments. 6. Regularly check for firmware updates from Tenda addressing this vulnerability and apply patches as soon as they become available. 7. Educate IT staff and users about the risks and signs of router compromise to enable rapid detection and response. 8. Implement network-level access controls and strong authentication mechanisms for router management interfaces to prevent unauthorized access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5795: Buffer Overflow in Tenda AC5
Description
A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5795 is a critical buffer overflow vulnerability identified in the Tenda AC5 router, specifically affecting firmware versions 1.0 and 15.03.06.47. The vulnerability resides in the function 'fromadvsetlanip' within the '/goform/AdvSetLanip' endpoint. The issue arises due to improper handling of the 'lanMask' argument, which can be manipulated by an attacker to overflow a buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been disclosed, increasing the risk of exploitation. The vulnerability's presence in a widely deployed consumer-grade router means that attackers could leverage it to gain control over the device, intercept or manipulate network traffic, or pivot into internal networks, potentially compromising connected systems and data.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the Tenda AC5. Exploitation could lead to unauthorized access to internal networks, data interception, and disruption of network services. Critical infrastructure or organizations relying on these routers for network connectivity could face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit means attackers can target vulnerable devices en masse, potentially leading to widespread compromise. Additionally, given the router's role at the network perimeter, successful exploitation could facilitate lateral movement within corporate networks, threatening confidentiality and integrity of sensitive information. The lack of patches or official updates at the time of disclosure exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda AC5 routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces or restrict access to trusted IP addresses only, reducing exposure to remote exploitation. 3. Monitor network traffic for unusual activity originating from or targeting the router, including unexpected outbound connections or anomalous LAN traffic. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 5. Where possible, replace Tenda AC5 devices with routers from vendors with timely security update practices, especially in sensitive environments. 6. Regularly check for firmware updates from Tenda addressing this vulnerability and apply patches as soon as they become available. 7. Educate IT staff and users about the risks and signs of router compromise to enable rapid detection and response. 8. Implement network-level access controls and strong authentication mechanisms for router management interfaces to prevent unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-06T08:29:30.876Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6843377571f4d251b5d89015
Added to database: 6/6/2025, 6:46:13 PM
Last enriched: 7/8/2025, 11:26:33 AM
Last updated: 8/3/2025, 8:41:31 AM
Views: 18
Related Threats
CVE-2025-8845: Stack-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8844: NULL Pointer Dereference in NASM Netwide Assember
MediumCVE-2025-8843: Heap-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8842: Use After Free in NASM Netwide Assember
MediumResearchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.