CVE-2025-5847: Stack-based Buffer Overflow in Tenda AC9
A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5847 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC9 router, specifically version 15.03.02.13. The flaw exists in the HTTP POST request handler component, within the function formSetSafeWanWebMan located in the /goform/SetRemoteWebCfg endpoint. The vulnerability arises due to improper handling and validation of the remoteIp argument, which an attacker can manipulate to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, as an attacker could gain control over the router or disrupt its operation. Although no public exploits are currently known to be actively used in the wild, the exploit details have been publicly disclosed, increasing the risk of imminent exploitation. The Tenda AC9 is a widely used consumer-grade Wi-Fi 6 router, often deployed in home and small office environments, which could be leveraged as a pivot point for broader network attacks if compromised.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office setups that rely on Tenda AC9 routers for internet connectivity. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches or lateral movement within corporate networks. The disruption of network availability could impact business continuity. Additionally, compromised routers could be conscripted into botnets for large-scale attacks such as DDoS campaigns, indirectly affecting European internet infrastructure. The lack of authentication and user interaction requirements means attackers can target these devices en masse, increasing the scale of potential impact. Given the increasing adoption of remote work in Europe, vulnerable home routers represent a critical attack surface that could be exploited to bypass corporate security controls.
Mitigation Recommendations
Immediate mitigation should focus on updating the Tenda AC9 firmware to a patched version once released by the vendor. Until a patch is available, organizations should implement network-level protections such as blocking inbound HTTP POST requests to the /goform/SetRemoteWebCfg endpoint from untrusted networks via firewall rules. Network segmentation should be enforced to isolate vulnerable routers from critical internal systems. Monitoring network traffic for unusual POST requests targeting the affected endpoint can help detect exploitation attempts. Disabling remote management features on the router, if not required, will reduce exposure. Additionally, organizations should consider replacing vulnerable Tenda AC9 devices with alternative routers that have a stronger security posture. Regular vulnerability scanning and asset inventory management will help identify and track affected devices. Finally, educating users about the risks of using outdated router firmware and encouraging timely updates is essential.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5847: Stack-based Buffer Overflow in Tenda AC9
Description
A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5847 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC9 router, specifically version 15.03.02.13. The flaw exists in the HTTP POST request handler component, within the function formSetSafeWanWebMan located in the /goform/SetRemoteWebCfg endpoint. The vulnerability arises due to improper handling and validation of the remoteIp argument, which an attacker can manipulate to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, as an attacker could gain control over the router or disrupt its operation. Although no public exploits are currently known to be actively used in the wild, the exploit details have been publicly disclosed, increasing the risk of imminent exploitation. The Tenda AC9 is a widely used consumer-grade Wi-Fi 6 router, often deployed in home and small office environments, which could be leveraged as a pivot point for broader network attacks if compromised.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office setups that rely on Tenda AC9 routers for internet connectivity. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches or lateral movement within corporate networks. The disruption of network availability could impact business continuity. Additionally, compromised routers could be conscripted into botnets for large-scale attacks such as DDoS campaigns, indirectly affecting European internet infrastructure. The lack of authentication and user interaction requirements means attackers can target these devices en masse, increasing the scale of potential impact. Given the increasing adoption of remote work in Europe, vulnerable home routers represent a critical attack surface that could be exploited to bypass corporate security controls.
Mitigation Recommendations
Immediate mitigation should focus on updating the Tenda AC9 firmware to a patched version once released by the vendor. Until a patch is available, organizations should implement network-level protections such as blocking inbound HTTP POST requests to the /goform/SetRemoteWebCfg endpoint from untrusted networks via firewall rules. Network segmentation should be enforced to isolate vulnerable routers from critical internal systems. Monitoring network traffic for unusual POST requests targeting the affected endpoint can help detect exploitation attempts. Disabling remote management features on the router, if not required, will reduce exposure. Additionally, organizations should consider replacing vulnerable Tenda AC9 devices with alternative routers that have a stronger security posture. Regular vulnerability scanning and asset inventory management will help identify and track affected devices. Finally, educating users about the risks of using outdated router firmware and encouraging timely updates is essential.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T09:22:34.441Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6845942271f4d251b5528aa8
Added to database: 6/8/2025, 1:46:10 PM
Last enriched: 7/9/2025, 12:42:44 AM
Last updated: 8/2/2025, 6:30:27 PM
Views: 17
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.