Skip to main content

CVE-2025-5847: Stack-based Buffer Overflow in Tenda AC9

High
VulnerabilityCVE-2025-5847cvecve-2025-5847
Published: Sun Jun 08 2025 (06/08/2025, 13:31:44 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC9

Description

A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:42:44 UTC

Technical Analysis

CVE-2025-5847 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC9 router, specifically version 15.03.02.13. The flaw exists in the HTTP POST request handler component, within the function formSetSafeWanWebMan located in the /goform/SetRemoteWebCfg endpoint. The vulnerability arises due to improper handling and validation of the remoteIp argument, which an attacker can manipulate to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, as an attacker could gain control over the router or disrupt its operation. Although no public exploits are currently known to be actively used in the wild, the exploit details have been publicly disclosed, increasing the risk of imminent exploitation. The Tenda AC9 is a widely used consumer-grade Wi-Fi 6 router, often deployed in home and small office environments, which could be leveraged as a pivot point for broader network attacks if compromised.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office setups that rely on Tenda AC9 routers for internet connectivity. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches or lateral movement within corporate networks. The disruption of network availability could impact business continuity. Additionally, compromised routers could be conscripted into botnets for large-scale attacks such as DDoS campaigns, indirectly affecting European internet infrastructure. The lack of authentication and user interaction requirements means attackers can target these devices en masse, increasing the scale of potential impact. Given the increasing adoption of remote work in Europe, vulnerable home routers represent a critical attack surface that could be exploited to bypass corporate security controls.

Mitigation Recommendations

Immediate mitigation should focus on updating the Tenda AC9 firmware to a patched version once released by the vendor. Until a patch is available, organizations should implement network-level protections such as blocking inbound HTTP POST requests to the /goform/SetRemoteWebCfg endpoint from untrusted networks via firewall rules. Network segmentation should be enforced to isolate vulnerable routers from critical internal systems. Monitoring network traffic for unusual POST requests targeting the affected endpoint can help detect exploitation attempts. Disabling remote management features on the router, if not required, will reduce exposure. Additionally, organizations should consider replacing vulnerable Tenda AC9 devices with alternative routers that have a stronger security posture. Regular vulnerability scanning and asset inventory management will help identify and track affected devices. Finally, educating users about the risks of using outdated router firmware and encouraging timely updates is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T09:22:34.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6845942271f4d251b5528aa8

Added to database: 6/8/2025, 1:46:10 PM

Last enriched: 7/9/2025, 12:42:44 AM

Last updated: 8/2/2025, 6:30:27 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats