CVE-2025-67073: n/a
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.
AI Analysis
Technical Summary
CVE-2025-67073 is a critical buffer overflow vulnerability identified in the Tenda AC10V4.0 router firmware version 16.03.10.20, specifically within the httpd binary's fromAdvSetMacMtuWan function. This function processes POST requests sent to the /goform/AdvSetMacMtuWan endpoint, and the vulnerability arises from improper handling of the 'serviceName' field in the request payload. An attacker can craft a malicious POST request with an oversized or specially crafted 'serviceName' value, causing a buffer overflow that can crash the httpd service, resulting in denial of service (DoS). More severely, the overflow may allow an attacker to execute arbitrary code remotely, potentially gaining control over the device. The exploit requires no authentication or user interaction, increasing its risk profile. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), and the CVSS v3.1 base score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity and ease of exploitation over the network. Although no patches or official fixes have been released yet, the vulnerability's presence in a widely deployed consumer router model raises concerns about widespread exposure. No known exploits have been reported in the wild as of the publication date, but the potential for rapid weaponization is high given the vulnerability's characteristics.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Exploitation could lead to complete compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This jeopardizes confidentiality, integrity, and availability of organizational communications and data. Denial of service attacks could disrupt business operations, while remote code execution could allow attackers to pivot into internal networks, deploy malware, or establish persistent backdoors. Organizations relying on Tenda AC10V4.0 routers, especially in small to medium enterprises or home office environments where such consumer-grade devices are common, are at heightened risk. The lack of authentication requirement means attackers can exploit the vulnerability remotely without prior access, increasing the attack surface. This could also impact managed service providers and ISPs using these devices for customer premises equipment. The absence of patches necessitates immediate risk mitigation to prevent exploitation and potential data breaches or service outages.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC10V4.0 routers from untrusted networks, especially the internet, to prevent remote exploitation. 2. Restrict access to router management interfaces by implementing firewall rules that limit access to trusted IP addresses only. 3. Monitor network traffic for unusual POST requests targeting /goform/AdvSetMacMtuWan, particularly those containing suspicious 'serviceName' payloads. 4. Where possible, replace vulnerable devices with models from vendors with timely security update practices. 5. Employ network segmentation to limit the impact of potential router compromise, ensuring critical systems are on separate VLANs or subnets. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts targeting this vulnerability. 7. Stay informed on vendor advisories for patches or firmware updates addressing this issue and apply them promptly once available. 8. Educate IT staff about this vulnerability and the importance of securing network devices, including consumer-grade routers. 9. Consider deploying network access control (NAC) solutions to enforce device compliance and prevent vulnerable devices from connecting to sensitive networks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-67073: n/a
Description
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.
AI-Powered Analysis
Technical Analysis
CVE-2025-67073 is a critical buffer overflow vulnerability identified in the Tenda AC10V4.0 router firmware version 16.03.10.20, specifically within the httpd binary's fromAdvSetMacMtuWan function. This function processes POST requests sent to the /goform/AdvSetMacMtuWan endpoint, and the vulnerability arises from improper handling of the 'serviceName' field in the request payload. An attacker can craft a malicious POST request with an oversized or specially crafted 'serviceName' value, causing a buffer overflow that can crash the httpd service, resulting in denial of service (DoS). More severely, the overflow may allow an attacker to execute arbitrary code remotely, potentially gaining control over the device. The exploit requires no authentication or user interaction, increasing its risk profile. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), and the CVSS v3.1 base score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity and ease of exploitation over the network. Although no patches or official fixes have been released yet, the vulnerability's presence in a widely deployed consumer router model raises concerns about widespread exposure. No known exploits have been reported in the wild as of the publication date, but the potential for rapid weaponization is high given the vulnerability's characteristics.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Exploitation could lead to complete compromise of affected routers, enabling attackers to intercept, manipulate, or disrupt network traffic. This jeopardizes confidentiality, integrity, and availability of organizational communications and data. Denial of service attacks could disrupt business operations, while remote code execution could allow attackers to pivot into internal networks, deploy malware, or establish persistent backdoors. Organizations relying on Tenda AC10V4.0 routers, especially in small to medium enterprises or home office environments where such consumer-grade devices are common, are at heightened risk. The lack of authentication requirement means attackers can exploit the vulnerability remotely without prior access, increasing the attack surface. This could also impact managed service providers and ISPs using these devices for customer premises equipment. The absence of patches necessitates immediate risk mitigation to prevent exploitation and potential data breaches or service outages.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC10V4.0 routers from untrusted networks, especially the internet, to prevent remote exploitation. 2. Restrict access to router management interfaces by implementing firewall rules that limit access to trusted IP addresses only. 3. Monitor network traffic for unusual POST requests targeting /goform/AdvSetMacMtuWan, particularly those containing suspicious 'serviceName' payloads. 4. Where possible, replace vulnerable devices with models from vendors with timely security update practices. 5. Employ network segmentation to limit the impact of potential router compromise, ensuring critical systems are on separate VLANs or subnets. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts targeting this vulnerability. 7. Stay informed on vendor advisories for patches or firmware updates addressing this issue and apply them promptly once available. 8. Educate IT staff about this vulnerability and the importance of securing network devices, including consumer-grade routers. 9. Consider deploying network access control (NAC) solutions to enforce device compliance and prevent vulnerable devices from connecting to sensitive networks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694302860b6f32e62bed0ebd
Added to database: 12/17/2025, 7:20:38 PM
Last enriched: 12/17/2025, 7:36:34 PM
Last updated: 12/18/2025, 5:50:02 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68462: CWE-732 Incorrect Permission Assignment for Critical Resource in Debian FreedomBox
LowCVE-2025-68461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Roundcube Webmail
HighCVE-2025-68460: CWE-116 Improper Encoding or Escaping of Output in Roundcube Webmail
HighCVE-2025-12885: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in awsmin Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files
MediumCVE-2025-14856: Code Injection in y_project RuoYi
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.