CVE-2025-5849: Stack-based Buffer Overflow in Tenda AC15
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5849 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC15 router firmware version 15.03.05.19_multi. The flaw exists in the HTTP POST request handler, specifically within the function formSetSafeWanWebMan located in the /goform/SetRemoteWebCfg endpoint. The vulnerability arises from improper handling of the 'remoteIp' argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation can allow attackers to execute arbitrary code, potentially gaining control over the router, intercepting or redirecting network traffic, or disrupting network availability. Although no public exploits are currently known to be actively used in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects a widely deployed consumer and small business router model, which is often used as a gateway device in home and office networks, making it a critical point of compromise if exploited.
Potential Impact
For European organizations, the exploitation of this vulnerability could have significant consequences. Many small and medium enterprises (SMEs) and home offices rely on consumer-grade routers like the Tenda AC15 for internet connectivity. A compromised router can lead to interception of sensitive communications, unauthorized network access, and lateral movement within internal networks. This can result in data breaches, intellectual property theft, and disruption of business operations. Additionally, compromised routers can be enlisted into botnets for large-scale attacks such as distributed denial of service (DDoS), which can further impact organizational availability and reputation. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices en masse, increasing the risk of widespread impact across European networks. The potential for integrity and availability loss is particularly concerning for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government agencies.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize the following actions: 1) Immediately identify and inventory all Tenda AC15 devices running firmware version 15.03.05.19_multi within their network. 2) Apply any available firmware updates or patches from Tenda as soon as they are released; if no official patch is available, consider temporarily disabling remote management features or restricting access to the /goform/SetRemoteWebCfg endpoint via firewall rules. 3) Implement network segmentation to isolate vulnerable devices from critical internal systems, limiting the potential impact of a compromise. 4) Monitor network traffic for unusual POST requests targeting the /goform/SetRemoteWebCfg endpoint, which may indicate exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against this endpoint. 6) Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates. 7) Consider replacing vulnerable devices with models that have a stronger security track record and ongoing vendor support if patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5849: Stack-based Buffer Overflow in Tenda AC15
Description
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5849 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC15 router firmware version 15.03.05.19_multi. The flaw exists in the HTTP POST request handler, specifically within the function formSetSafeWanWebMan located in the /goform/SetRemoteWebCfg endpoint. The vulnerability arises from improper handling of the 'remoteIp' argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation can allow attackers to execute arbitrary code, potentially gaining control over the router, intercepting or redirecting network traffic, or disrupting network availability. Although no public exploits are currently known to be actively used in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects a widely deployed consumer and small business router model, which is often used as a gateway device in home and office networks, making it a critical point of compromise if exploited.
Potential Impact
For European organizations, the exploitation of this vulnerability could have significant consequences. Many small and medium enterprises (SMEs) and home offices rely on consumer-grade routers like the Tenda AC15 for internet connectivity. A compromised router can lead to interception of sensitive communications, unauthorized network access, and lateral movement within internal networks. This can result in data breaches, intellectual property theft, and disruption of business operations. Additionally, compromised routers can be enlisted into botnets for large-scale attacks such as distributed denial of service (DDoS), which can further impact organizational availability and reputation. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices en masse, increasing the risk of widespread impact across European networks. The potential for integrity and availability loss is particularly concerning for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government agencies.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize the following actions: 1) Immediately identify and inventory all Tenda AC15 devices running firmware version 15.03.05.19_multi within their network. 2) Apply any available firmware updates or patches from Tenda as soon as they are released; if no official patch is available, consider temporarily disabling remote management features or restricting access to the /goform/SetRemoteWebCfg endpoint via firewall rules. 3) Implement network segmentation to isolate vulnerable devices from critical internal systems, limiting the potential impact of a compromise. 4) Monitor network traffic for unusual POST requests targeting the /goform/SetRemoteWebCfg endpoint, which may indicate exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against this endpoint. 6) Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates. 7) Consider replacing vulnerable devices with models that have a stronger security track record and ongoing vendor support if patching is not feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T09:25:18.154Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684612a671f4d251b56c2f37
Added to database: 6/8/2025, 10:45:58 PM
Last enriched: 7/9/2025, 1:41:02 AM
Last updated: 11/22/2025, 7:15:11 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.