Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65221: n/a

0
Medium
VulnerabilityCVE-2025-65221cvecve-2025-65221
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the list parameter of /goform/setPptpUserList.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:20:55 UTC

Technical Analysis

CVE-2025-65221 identifies a buffer overflow vulnerability in the Tenda AC21 router firmware version V16.03.08.16. The flaw exists in the handling of the 'list' parameter within the /goform/setPptpUserList endpoint, which is likely part of the router's PPTP VPN user configuration interface. Buffer overflow vulnerabilities occur when input data exceeds the allocated memory buffer, potentially overwriting adjacent memory and enabling arbitrary code execution or system crashes. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router's management interface, targeting the vulnerable parameter. Successful exploitation could allow remote code execution with the privileges of the router's firmware process, leading to full compromise of the device. This could enable attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt network availability. No public exploits or patches are currently available, and the vulnerability was published on November 20, 2025, with no CVSS score assigned yet. The lack of authentication requirement is inferred given the nature of the endpoint, but network access to the router's management interface is necessary. The vulnerability is significant due to the widespread use of Tenda AC21 routers in consumer and small business environments, which often lack robust network segmentation or monitoring.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to internal networks, interception of sensitive communications, and disruption of network services. Small and medium enterprises (SMEs) using Tenda AC21 routers for VPN connectivity or network routing are particularly at risk, as compromise of these devices can serve as a foothold for further attacks. Confidentiality could be breached through traffic interception or data exfiltration, integrity compromised by manipulation of network traffic or device configurations, and availability impacted by denial of service or device crashes. The absence of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. Organizations in Europe with limited IT security resources may be more vulnerable due to delayed patching or lack of network access controls. The threat also extends to home office environments increasingly common in Europe, where such routers are deployed without enterprise-grade protections.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the router's management interface, ideally limiting it to trusted internal networks and disabling remote management features if not required. Network segmentation should be enforced to isolate vulnerable devices from critical infrastructure. Monitoring network traffic for unusual requests to the /goform/setPptpUserList endpoint can help detect exploitation attempts. Organizations should engage with Tenda to obtain firmware updates addressing this vulnerability and apply them promptly once available. In the interim, consider replacing vulnerable devices with models from vendors with more robust security track records. Employ network-level protections such as firewalls and intrusion detection/prevention systems configured to detect anomalous HTTP requests targeting router management interfaces. Educate users and administrators about the risks of using outdated firmware and the importance of timely updates. Finally, maintain regular backups of router configurations to enable rapid recovery if devices are compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f2ef845657ce9d4e9f7bb

Added to database: 11/20/2025, 3:08:40 PM

Last enriched: 11/20/2025, 3:20:55 PM

Last updated: 11/22/2025, 3:17:14 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats