Skip to main content

CVE-2025-5863: Stack-based Buffer Overflow in Tenda AC5

High
VulnerabilityCVE-2025-5863cvecve-2025-5863
Published: Mon Jun 09 2025 (06/09/2025, 05:31:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC5

Description

A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 06:09:37 UTC

Technical Analysis

CVE-2025-5863 is a critical security vulnerability identified in the Tenda AC5 router, specifically in firmware version 15.03.06.47. The flaw exists in the function formSetRebootTimer within the /goform/SetRebootTimer endpoint. This vulnerability is a stack-based buffer overflow triggered by improper handling of the rebootTime argument. An attacker can remotely send a specially crafted request to this endpoint, causing the buffer overflow condition. This can lead to arbitrary code execution on the device without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability affects the confidentiality, integrity, and availability of the device, potentially allowing attackers to take full control of the router, intercept or manipulate network traffic, or disrupt network services. The exploit has been publicly disclosed, increasing the risk of exploitation, although no confirmed exploits in the wild have been reported yet. The CVSS 4.0 base score of 8.7 classifies this as a high-severity issue, reflecting the ease of exploitation and the critical impact on affected devices. The vulnerability does not require user interaction but does require low privileges (PR:L), which typically means an attacker needs to be on the local network or have some level of access to the device's management interface. However, since the attack vector is network-based (AV:N), remote exploitation is feasible, especially if the device is exposed to the internet or an untrusted network. The lack of available patches at the time of disclosure increases the urgency for mitigation and risk management by affected users and organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant. Tenda AC5 routers are commonly used in small to medium-sized enterprises and home office environments, which are prevalent across Europe. Successful exploitation could allow attackers to gain persistent control over network gateways, enabling interception of sensitive communications, insertion of malicious payloads, or disruption of network connectivity. This could lead to data breaches, loss of service, and compromise of internal network security. Given the critical nature of the vulnerability and the potential for remote exploitation without user interaction, attackers could leverage this flaw to establish footholds within corporate networks or disrupt critical business operations. The risk is heightened in organizations with limited IT security resources or those that have not implemented network segmentation or device hardening. Additionally, the exposure of such routers to the public internet or untrusted networks increases the attack surface. The vulnerability could also be exploited as part of larger botnet campaigns or ransomware attacks targeting European infrastructure, further amplifying its impact.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using Tenda AC5 routers running firmware version 15.03.06.47. Immediate steps include: 1) Isolate affected devices from untrusted networks, especially the internet, by disabling remote management interfaces or applying strict firewall rules limiting access to trusted IP addresses. 2) Implement network segmentation to restrict the exposure of vulnerable routers to critical internal systems. 3) Monitor network traffic for unusual activity targeting the /goform/SetRebootTimer endpoint or anomalous reboot commands. 4) Contact Tenda support or check official channels regularly for firmware updates or patches addressing CVE-2025-5863 and apply them promptly once available. 5) As a temporary workaround, consider disabling or restricting access to the reboot timer functionality if configurable. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7) Educate IT staff about the vulnerability and ensure incident response plans include steps for handling potential exploitation. These measures go beyond generic advice by focusing on network-level controls, monitoring specific attack vectors, and emphasizing proactive isolation and segmentation to reduce risk until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T13:27:21.149Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6846751e71f4d251b580111c

Added to database: 6/9/2025, 5:46:06 AM

Last enriched: 7/9/2025, 6:09:37 AM

Last updated: 8/5/2025, 2:24:34 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats