CVE-2025-5861: Buffer Overflow in Tenda AC7
A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5861 is a critical buffer overflow vulnerability identified in the Tenda AC7 router, specifically in firmware version 15.03.06.44. The vulnerability resides in the function 'fromadvsetlanip' within the '/goform/AdvSetLanip' endpoint. The flaw is triggered by manipulating the 'lanMask' argument, which leads to a buffer overflow condition. This vulnerability is exploitable remotely without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, indicating that successful exploitation could allow an attacker to execute arbitrary code, potentially leading to full system compromise, data leakage, or denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of imminent attacks. The vulnerability affects a widely used consumer and small office router model, which is often deployed in home and small business environments, potentially serving as a pivot point for attackers to infiltrate larger networks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office setups that rely on Tenda AC7 routers for network connectivity. Exploitation could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Given the router's role as a gateway device, attackers could leverage this vulnerability to establish persistent footholds, launch lateral movement attacks, or exfiltrate confidential information. The widespread use of Tenda devices in residential and small business environments across Europe increases the attack surface. Additionally, critical infrastructure or organizations with remote workers using vulnerable routers may face increased risks. The lack of a patch at the time of disclosure further exacerbates the threat, necessitating immediate mitigation to prevent exploitation.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda AC7 routers running firmware version 15.03.06.44 within their networks. Since no official patch is currently available, temporary mitigations include isolating these devices from critical network segments and restricting remote access to the router management interface, especially from untrusted networks. Network-based intrusion detection and prevention systems (IDS/IPS) should be configured to monitor and block suspicious traffic targeting the '/goform/AdvSetLanip' endpoint or anomalous HTTP POST requests containing crafted 'lanMask' parameters. Administrators should enforce strong network segmentation and consider replacing vulnerable devices with models from vendors with timely security support. Regularly monitoring vendor announcements for firmware updates and applying patches promptly once available is critical. Additionally, educating users about the risks of exposing router management interfaces to the internet and enforcing strong administrative credentials can reduce exploitation likelihood.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5861: Buffer Overflow in Tenda AC7
Description
A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5861 is a critical buffer overflow vulnerability identified in the Tenda AC7 router, specifically in firmware version 15.03.06.44. The vulnerability resides in the function 'fromadvsetlanip' within the '/goform/AdvSetLanip' endpoint. The flaw is triggered by manipulating the 'lanMask' argument, which leads to a buffer overflow condition. This vulnerability is exploitable remotely without requiring user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, indicating that successful exploitation could allow an attacker to execute arbitrary code, potentially leading to full system compromise, data leakage, or denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of imminent attacks. The vulnerability affects a widely used consumer and small office router model, which is often deployed in home and small business environments, potentially serving as a pivot point for attackers to infiltrate larger networks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office setups that rely on Tenda AC7 routers for network connectivity. Exploitation could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Given the router's role as a gateway device, attackers could leverage this vulnerability to establish persistent footholds, launch lateral movement attacks, or exfiltrate confidential information. The widespread use of Tenda devices in residential and small business environments across Europe increases the attack surface. Additionally, critical infrastructure or organizations with remote workers using vulnerable routers may face increased risks. The lack of a patch at the time of disclosure further exacerbates the threat, necessitating immediate mitigation to prevent exploitation.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda AC7 routers running firmware version 15.03.06.44 within their networks. Since no official patch is currently available, temporary mitigations include isolating these devices from critical network segments and restricting remote access to the router management interface, especially from untrusted networks. Network-based intrusion detection and prevention systems (IDS/IPS) should be configured to monitor and block suspicious traffic targeting the '/goform/AdvSetLanip' endpoint or anomalous HTTP POST requests containing crafted 'lanMask' parameters. Administrators should enforce strong network segmentation and consider replacing vulnerable devices with models from vendors with timely security support. Regularly monitoring vendor announcements for firmware updates and applying patches promptly once available is critical. Additionally, educating users about the risks of exposing router management interfaces to the internet and enforcing strong administrative credentials can reduce exploitation likelihood.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T13:25:26.572Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6846672371f4d251b57d288e
Added to database: 6/9/2025, 4:46:27 AM
Last enriched: 7/9/2025, 5:09:31 AM
Last updated: 1/7/2026, 4:19:28 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.