CVE-2025-60660: n/a
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.
AI Analysis
Technical Summary
CVE-2025-60660 is a stack overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.05.19. The flaw exists in the fromAdvSetMacMtuWan function, specifically triggered by the mac parameter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory. This can lead to unpredictable behavior including crashes, memory corruption, or arbitrary code execution. In this case, the vulnerability could allow an attacker to craft a malicious input for the mac parameter to overflow the stack, potentially enabling remote code execution or denial of service on the affected device. The lack of a CVSS score and absence of known exploits in the wild suggest this is a recently discovered vulnerability with limited public exploitation information. However, stack overflow vulnerabilities in network devices such as routers are critical due to their position as network gateways and their typical exposure to untrusted networks. The affected product, Tenda AC18, is a consumer-grade wireless router commonly used in home and small office environments. The vulnerability likely requires sending specially crafted network packets or requests to the router's management interface or network-facing services that invoke the vulnerable function. No patch or mitigation details are currently provided, indicating that users and administrators should exercise caution and monitor for updates from the vendor. Given the nature of the vulnerability, exploitation could compromise the confidentiality, integrity, and availability of the network traffic passing through the router, as well as potentially allow attackers to pivot into internal networks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC18 routers. Successful exploitation could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. This could result in data breaches, loss of business continuity, and potential regulatory non-compliance under GDPR if personal data is exposed. The router's role as a network gateway means that compromise could facilitate lateral movement within corporate networks or provide a foothold for further attacks. Additionally, the lack of patches increases the window of exposure. Organizations with remote or hybrid workforces using these routers at home may inadvertently introduce vulnerabilities into their corporate network perimeter. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly after public disclosure.
Mitigation Recommendations
1. Immediate mitigation should include isolating Tenda AC18 routers from untrusted networks and restricting remote management access to trusted IPs or VPNs only. 2. Network segmentation should be employed to limit the impact of a compromised router, ensuring that critical systems are not directly accessible through vulnerable devices. 3. Monitor network traffic for unusual activity that could indicate exploitation attempts, such as malformed packets targeting the mac parameter or unexpected router behavior. 4. Regularly check for firmware updates from Tenda and apply patches promptly once available. 5. Consider replacing affected routers with models from vendors with a strong security track record if patches are delayed. 6. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploitation attempts targeting known router vulnerabilities. 7. Educate users about the risks of using consumer-grade routers for business-critical functions and encourage secure configuration practices, including changing default credentials and disabling unnecessary services.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-60660: n/a
Description
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.
AI-Powered Analysis
Technical Analysis
CVE-2025-60660 is a stack overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.05.19. The flaw exists in the fromAdvSetMacMtuWan function, specifically triggered by the mac parameter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory. This can lead to unpredictable behavior including crashes, memory corruption, or arbitrary code execution. In this case, the vulnerability could allow an attacker to craft a malicious input for the mac parameter to overflow the stack, potentially enabling remote code execution or denial of service on the affected device. The lack of a CVSS score and absence of known exploits in the wild suggest this is a recently discovered vulnerability with limited public exploitation information. However, stack overflow vulnerabilities in network devices such as routers are critical due to their position as network gateways and their typical exposure to untrusted networks. The affected product, Tenda AC18, is a consumer-grade wireless router commonly used in home and small office environments. The vulnerability likely requires sending specially crafted network packets or requests to the router's management interface or network-facing services that invoke the vulnerable function. No patch or mitigation details are currently provided, indicating that users and administrators should exercise caution and monitor for updates from the vendor. Given the nature of the vulnerability, exploitation could compromise the confidentiality, integrity, and availability of the network traffic passing through the router, as well as potentially allow attackers to pivot into internal networks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC18 routers. Successful exploitation could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. This could result in data breaches, loss of business continuity, and potential regulatory non-compliance under GDPR if personal data is exposed. The router's role as a network gateway means that compromise could facilitate lateral movement within corporate networks or provide a foothold for further attacks. Additionally, the lack of patches increases the window of exposure. Organizations with remote or hybrid workforces using these routers at home may inadvertently introduce vulnerabilities into their corporate network perimeter. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly after public disclosure.
Mitigation Recommendations
1. Immediate mitigation should include isolating Tenda AC18 routers from untrusted networks and restricting remote management access to trusted IPs or VPNs only. 2. Network segmentation should be employed to limit the impact of a compromised router, ensuring that critical systems are not directly accessible through vulnerable devices. 3. Monitor network traffic for unusual activity that could indicate exploitation attempts, such as malformed packets targeting the mac parameter or unexpected router behavior. 4. Regularly check for firmware updates from Tenda and apply patches promptly once available. 5. Consider replacing affected routers with models from vendors with a strong security track record if patches are delayed. 6. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploitation attempts targeting known router vulnerabilities. 7. Educate users about the risks of using consumer-grade routers for business-critical functions and encourage secure configuration practices, including changing default credentials and disabling unnecessary services.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68dea4342d88283ed76fb5c5
Added to database: 10/2/2025, 4:11:32 PM
Last enriched: 10/2/2025, 4:12:08 PM
Last updated: 1/7/2026, 8:46:48 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.