Skip to main content

CVE-2025-5852: Buffer Overflow in Tenda AC6

High
VulnerabilityCVE-2025-5852cvecve-2025-5852
Published: Mon Jun 09 2025 (06/09/2025, 00:00:18 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC6

Description

A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 01:41:51 UTC

Technical Analysis

CVE-2025-5852 is a critical buffer overflow vulnerability identified in the Tenda AC6 router firmware version 15.03.05.16. The flaw exists in the function formSetPPTPUserList within the /goform/setPptpUserList endpoint. Specifically, the vulnerability arises from improper handling and validation of the argument list passed to this function, which allows an attacker to overflow a buffer. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the significant risk posed by this flaw. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as successful exploitation can allow attackers to execute arbitrary commands with elevated privileges, potentially taking full control of the router. Given that the Tenda AC6 is a widely used consumer and small office/home office (SOHO) router, exploitation could also facilitate lateral movement within networks or interception of network traffic.

Potential Impact

For European organizations, the exploitation of CVE-2025-5852 could have severe consequences. Many small and medium enterprises (SMEs) and home offices rely on consumer-grade routers like the Tenda AC6 for internet connectivity. A compromised router could lead to interception of sensitive communications, unauthorized network access, and disruption of business operations. The vulnerability's remote exploitability without authentication means attackers can target exposed devices over the internet or local networks. This could result in data breaches, espionage, or use of compromised routers as pivot points for further attacks. Critical infrastructure or organizations with remote workers using vulnerable routers may face increased risk. Additionally, the public disclosure of exploit code raises the threat level, as less skilled attackers can attempt exploitation. The impact extends beyond confidentiality to integrity and availability, potentially causing network outages or manipulation of traffic flows.

Mitigation Recommendations

To mitigate CVE-2025-5852 effectively, European organizations and users should: 1) Immediately check for firmware updates from Tenda addressing this vulnerability and apply patches as soon as they become available. 2) If patches are not yet released, consider temporarily disabling the PPTP user list configuration interface or restricting access to the /goform/setPptpUserList endpoint via firewall rules or network segmentation to limit exposure. 3) Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous requests targeting this endpoint. 4) Replace vulnerable Tenda AC6 devices with more secure alternatives if patching is delayed or unsupported. 5) Monitor network traffic for signs of exploitation attempts, including unusual outbound connections or command execution patterns. 6) Educate users about the risks of using outdated router firmware and encourage regular updates. 7) For organizations, enforce strict network access controls and consider VPN usage to reduce exposure of vulnerable devices to the internet. These steps go beyond generic advice by focusing on immediate containment, proactive monitoring, and device lifecycle management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T09:29:09.363Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68462eda71f4d251b571c596

Added to database: 6/9/2025, 12:46:18 AM

Last enriched: 7/9/2025, 1:41:51 AM

Last updated: 8/7/2025, 6:06:07 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats