Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67073: n/a

0
Critical
VulnerabilityCVE-2025-67073cvecve-2025-67073
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:36:34 UTC

Technical Analysis

CVE-2025-67073 is a critical buffer overflow vulnerability identified in the Tenda AC10V4.0 router firmware version 16.03.10.20, specifically within the httpd binary's fromAdvSetMacMtuWan function. This function processes POST requests sent to the /goform/AdvSetMacMtuWan endpoint, and the vulnerability arises from improper handling of the 'serviceName' field in the request payload. An attacker can craft a malicious POST request with an oversized or specially crafted 'serviceName' value, causing a buffer overflow that can crash the httpd service, resulting in denial of service (DoS). More severely, the overflow may allow an attacker to execute arbitrary code remotely, potentially gaining control over the device. The exploit requires no authentication or user interaction, increasing its risk profile. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), and the CVSS v3.1 base score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity and ease of exploitation over the network. Although no patches or official fixes have been released yet, the vulnerability's presence in a widely deployed consumer router model raises concerns about widespread exposure. No known exploits have been reported in the wild as of the publication date, but the potential for rapid weaponization is high given the vulnerability's characteristics.

Potential Impact

For European organizations, this vulnerability poses a significant threat to network infrastructure security. Exploitation could lead to complete compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This jeopardizes confidentiality, integrity, and availability of organizational communications and data. Denial of service attacks could disrupt business operations, while remote code execution could allow attackers to pivot into internal networks, deploy malware, or establish persistent backdoors. Organizations relying on Tenda AC10V4.0 routers, especially in small to medium enterprises or home office environments where such consumer-grade devices are common, are at heightened risk. The lack of authentication requirement means attackers can exploit the vulnerability remotely without prior access, increasing the attack surface. This could also impact managed service providers and ISPs using these devices for customer premises equipment. The absence of patches necessitates immediate risk mitigation to prevent exploitation and potential data breaches or service outages.

Mitigation Recommendations

1. Immediately isolate affected Tenda AC10V4.0 routers from untrusted networks, especially the internet, to prevent remote exploitation. 2. Restrict access to router management interfaces by implementing firewall rules that limit access to trusted IP addresses only. 3. Monitor network traffic for unusual POST requests targeting /goform/AdvSetMacMtuWan, particularly those containing suspicious 'serviceName' payloads. 4. Where possible, replace vulnerable devices with models from vendors with timely security update practices. 5. Employ network segmentation to limit the impact of potential router compromise, ensuring critical systems are on separate VLANs or subnets. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts targeting this vulnerability. 7. Stay informed on vendor advisories for patches or firmware updates addressing this issue and apply them promptly once available. 8. Educate IT staff about this vulnerability and the importance of securing network devices, including consumer-grade routers. 9. Consider deploying network access control (NAC) solutions to enforce device compliance and prevent vulnerable devices from connecting to sensitive networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694302860b6f32e62bed0ebd

Added to database: 12/17/2025, 7:20:38 PM

Last enriched: 12/17/2025, 7:36:34 PM

Last updated: 12/18/2025, 5:50:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats