Skip to main content

CVE-2025-5795: Buffer Overflow in Tenda AC5

High
VulnerabilityCVE-2025-5795cvecve-2025-5795
Published: Fri Jun 06 2025 (06/06/2025, 18:31:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC5

Description

A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 11:26:33 UTC

Technical Analysis

CVE-2025-5795 is a critical buffer overflow vulnerability identified in the Tenda AC5 router, specifically affecting firmware versions 1.0 and 15.03.06.47. The vulnerability resides in the function 'fromadvsetlanip' within the '/goform/AdvSetLanip' endpoint. The issue arises due to improper handling of the 'lanMask' argument, which can be manipulated by an attacker to overflow a buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been disclosed, increasing the risk of exploitation. The vulnerability's presence in a widely deployed consumer-grade router means that attackers could leverage it to gain control over the device, intercept or manipulate network traffic, or pivot into internal networks, potentially compromising connected systems and data.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the Tenda AC5. Exploitation could lead to unauthorized access to internal networks, data interception, and disruption of network services. Critical infrastructure or organizations relying on these routers for network connectivity could face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit means attackers can target vulnerable devices en masse, potentially leading to widespread compromise. Additionally, given the router's role at the network perimeter, successful exploitation could facilitate lateral movement within corporate networks, threatening confidentiality and integrity of sensitive information. The lack of patches or official updates at the time of disclosure exacerbates the risk, requiring organizations to implement compensating controls promptly.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda AC5 routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces or restrict access to trusted IP addresses only, reducing exposure to remote exploitation. 3. Monitor network traffic for unusual activity originating from or targeting the router, including unexpected outbound connections or anomalous LAN traffic. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 5. Where possible, replace Tenda AC5 devices with routers from vendors with timely security update practices, especially in sensitive environments. 6. Regularly check for firmware updates from Tenda addressing this vulnerability and apply patches as soon as they become available. 7. Educate IT staff and users about the risks and signs of router compromise to enable rapid detection and response. 8. Implement network-level access controls and strong authentication mechanisms for router management interfaces to prevent unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-06T08:29:30.876Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6843377571f4d251b5d89015

Added to database: 6/6/2025, 6:46:13 PM

Last enriched: 7/8/2025, 11:26:33 AM

Last updated: 8/3/2025, 8:41:31 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats