Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65223: n/a

0
Medium
VulnerabilityCVE-2025-65223cvecve-2025-65223
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65223 is a medium severity buffer overflow vulnerability found in the Tenda AC21 router firmware version V16. 03. 08. 16. The flaw exists in the /goform/saveParentControlInfo endpoint, specifically in the handling of the 'urls' parameter. Exploitation requires network-level access (adjacent network) but no authentication or user interaction is needed. Successful exploitation can cause denial of service by crashing the device, impacting availability but not confidentiality or integrity. No known exploits are currently reported in the wild. European organizations using Tenda AC21 routers may experience network disruptions if targeted. Mitigation involves monitoring for firmware updates from Tenda and restricting access to router management interfaces.

AI-Powered Analysis

AILast updated: 11/27/2025, 15:49:46 UTC

Technical Analysis

CVE-2025-65223 is a buffer overflow vulnerability identified in the Tenda AC21 router firmware version V16.03.08.16. The vulnerability resides in the processing of the 'urls' parameter within the /goform/saveParentControlInfo HTTP endpoint. Buffer overflow (CWE-121) occurs when the input exceeds the allocated buffer size, potentially leading to memory corruption. This flaw can be triggered remotely by an attacker with access to the adjacent network segment, as the attack vector is network-based (AV:A). No privileges or authentication are required (PR:N), and no user interaction is necessary (UI:N). The vulnerability does not impact confidentiality or integrity but affects availability by causing the router to crash or reboot, resulting in denial of service. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact and exploitation conditions. No patches or exploits are currently publicly available, but the vulnerability is published and reserved under CVE-2025-65223. The router is commonly used in home and small office environments, where disruption can affect internet connectivity and network services.

Potential Impact

For European organizations, especially small and medium-sized businesses and residential users relying on Tenda AC21 routers, this vulnerability poses a risk of network downtime due to denial of service. While it does not compromise data confidentiality or integrity, loss of availability can disrupt business operations, remote work, and critical communications. In sectors with high dependency on continuous internet access, such as finance, healthcare, and manufacturing, even temporary outages can have operational and financial consequences. Additionally, attackers could leverage this vulnerability as part of a larger attack chain to cause disruption or as a distraction while conducting other malicious activities. The absence of known exploits reduces immediate risk, but the potential for future exploitation exists if the vulnerability is weaponized.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface, especially the /goform/saveParentControlInfo endpoint, by implementing network segmentation and firewall rules limiting access to trusted devices only. 2. Monitor Tenda’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. Employ network intrusion detection systems (NIDS) to detect anomalous HTTP requests targeting the vulnerable endpoint or unusual traffic patterns indicative of exploitation attempts. 4. For organizations with multiple Tenda AC21 devices, consider replacing affected routers with models from vendors with stronger security track records or those that provide timely security updates. 5. Educate users about the risks of exposing router management interfaces to untrusted networks, including Wi-Fi guest networks or the internet. 6. Regularly audit network devices for firmware versions and known vulnerabilities to maintain an up-to-date inventory and risk profile.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f2ef845657ce9d4e9f7c1

Added to database: 11/20/2025, 3:08:40 PM

Last enriched: 11/27/2025, 3:49:46 PM

Last updated: 1/7/2026, 8:47:12 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats