Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65226: n/a

0
Medium
VulnerabilityCVE-2025-65226cvecve-2025-65226
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the deviceId parameter in /goform/saveParentControlInfo.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:23:04 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65226 affects the Tenda AC21 router running firmware version V16.03.08.16. It is a buffer overflow vulnerability triggered via the deviceId parameter in the /goform/saveParentControlInfo HTTP endpoint. Buffer overflow vulnerabilities occur when input data exceeds the allocated buffer size, overwriting adjacent memory and potentially allowing attackers to execute arbitrary code or crash the device. In this case, the deviceId parameter is insufficiently validated or sanitized, enabling crafted requests to overflow the buffer. Since this endpoint is part of the router's web interface, it is likely accessible to attackers on the local network or possibly remotely if remote management is enabled. No authentication requirements are specified, which implies that exploitation could be performed without credentials, increasing the attack surface. The vulnerability has been published recently with no CVSS score assigned and no known exploits in the wild yet. The absence of patches or mitigation details from the vendor means that affected users remain exposed. Given the nature of the vulnerability and the device's role as a network gateway, successful exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or disrupt network traffic, and potentially pivot to internal networks. The Tenda AC21 router is a popular consumer and small business device, making this vulnerability relevant to a broad user base.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office users relying on Tenda AC21 routers. Compromise of the router could lead to interception of sensitive communications, insertion of malicious payloads into network traffic, and disruption of internet connectivity. This could result in data breaches, loss of confidentiality, and operational downtime. Furthermore, attackers gaining control over the router could use it as a foothold to launch further attacks against internal systems or as part of a botnet for broader malicious campaigns. The lack of authentication for exploitation increases the risk of remote attacks, particularly if remote management features are enabled or if the device is exposed to the internet. Given the widespread use of Tenda routers in Europe, the vulnerability could affect a large number of endpoints, amplifying the potential impact on regional cybersecurity posture.

Mitigation Recommendations

1. Immediately disable remote management features on Tenda AC21 routers to reduce exposure to external attackers. 2. Restrict access to the router's web interface to trusted internal networks only, using firewall rules or network segmentation. 3. Monitor network traffic for unusual or malformed requests targeting the /goform/saveParentControlInfo endpoint, which could indicate exploitation attempts. 4. Apply strict input validation and filtering at network perimeters to detect and block suspicious payloads targeting the deviceId parameter. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable routers with models from vendors with a strong security track record if patches are delayed. 7. Educate users about the risks of exposing router management interfaces and encourage secure configuration practices. 8. Implement network intrusion detection systems capable of identifying buffer overflow attack patterns targeting embedded devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f31a85f37bd1ac4562527

Added to database: 11/20/2025, 3:20:08 PM

Last enriched: 11/20/2025, 3:23:04 PM

Last updated: 11/20/2025, 5:58:37 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats