Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65222: n/a

0
Medium
VulnerabilityCVE-2025-65222cvecve-2025-65222
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the rebootTime parameter of /goform/SetSysAutoRebbotCfg.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:20:41 UTC

Technical Analysis

CVE-2025-65222 is a buffer overflow vulnerability identified in the Tenda AC21 router firmware version V16.03.08.16. The flaw exists in the handling of the rebootTime parameter within the /goform/SetSysAutoRebbotCfg HTTP endpoint, which is part of the router's web-based management interface. Buffer overflow vulnerabilities occur when input data exceeds the allocated buffer size, potentially overwriting adjacent memory and enabling attackers to execute arbitrary code or crash the system. In this case, an attacker can send a specially crafted HTTP request to the vulnerable endpoint, causing the buffer overflow. This could lead to remote code execution or denial of service (DoS) conditions on the router. The vulnerability does not require authentication, increasing the risk if the management interface is exposed externally or accessible to untrusted internal users. No public exploits or patches are currently available, and no CVSS score has been assigned yet. The vulnerability was reserved and published in November 2025, indicating recent discovery. The lack of patch links suggests that mitigation may rely on vendor updates or network controls. The router is commonly used in consumer and small business environments, which may lack robust security controls, increasing the risk of exploitation. Attackers exploiting this vulnerability could gain control over the router, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to significant network disruptions and compromise of network security. A successful attack could allow adversaries to execute arbitrary code on the router, potentially gaining persistent access to the network perimeter device. This could facilitate further lateral movement, interception of sensitive data, or disruption of services. Small and medium enterprises (SMEs) and home office environments using Tenda AC21 routers are particularly at risk due to potentially weaker network segmentation and security monitoring. The denial of service impact could cause network outages, affecting business continuity. Additionally, compromised routers could be leveraged as part of botnets or for launching attacks against other targets. The absence of authentication requirements for exploitation increases the threat level, especially if remote management interfaces are exposed to the internet. European organizations with remote workforce setups or less stringent network access controls may be more vulnerable. The impact on confidentiality, integrity, and availability is high given the router’s role as a gateway device.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by disabling remote management or limiting it to trusted IP addresses via firewall rules. 2. Monitor network traffic for unusual HTTP requests targeting /goform/SetSysAutoRebbotCfg or other suspicious activity indicative of exploitation attempts. 3. Apply any available firmware updates from Tenda as soon as they are released addressing this vulnerability. 4. If no patch is available, consider replacing vulnerable devices with models from vendors with active security support. 5. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect and block exploit attempts targeting this vulnerability. 7. Educate IT staff and users about the risks of exposing router management interfaces to untrusted networks. 8. Regularly audit router configurations to ensure default credentials are changed and unnecessary services are disabled. 9. Employ network access control (NAC) to limit device connectivity based on security posture. 10. Maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f2ef845657ce9d4e9f7be

Added to database: 11/20/2025, 3:08:40 PM

Last enriched: 11/20/2025, 3:20:41 PM

Last updated: 11/22/2025, 4:50:13 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats