Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67074: n/a

0
Medium
VulnerabilityCVE-2025-67074cvecve-2025-67074
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:30:56 UTC

Technical Analysis

CVE-2025-67074 is a buffer overflow vulnerability identified in the fromAdvSetMacMtuWan function of the HTTP daemon (httpd) component on Tenda AC10V4.0 routers with firmware version 16.03.10.20. The vulnerability arises when the device processes a POST request to the /goform/AdvSetMacMtuWan endpoint containing a specially crafted payload in the serverName field. Due to improper bounds checking, the crafted input can overflow the buffer, leading to memory corruption. This can cause the device to crash, resulting in denial of service (DoS), or potentially allow an attacker to execute arbitrary code remotely. The attack vector is network-based, requiring only access to the router's HTTP management interface, which may be exposed on local or WAN networks depending on configuration. No authentication or user interaction is required, increasing the risk if the interface is exposed externally. The CVSS 3.1 base score is 6.5, reflecting medium severity with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without confidentiality or integrity impact. No patches or known exploits are currently available, but the vulnerability is classified under CWE-120 (classic buffer overflow). The lack of affected version details beyond the firmware version suggests limited scope but significant risk for users of this specific router model and firmware. The vulnerability could be exploited by attackers to disrupt network connectivity or potentially gain control over the device, which could be leveraged for further attacks within a network.

Potential Impact

For European organizations, the primary impact of CVE-2025-67074 is the potential denial of service on affected Tenda AC10V4.0 routers, which could disrupt internet connectivity or internal network operations. In environments where these routers serve as gateways or critical network infrastructure, this could lead to operational downtime and productivity loss. Although the vulnerability currently has no confirmed exploits in the wild, the possibility of remote code execution elevates the risk, as attackers could gain persistent access to the network or pivot to other internal systems. Organizations relying on these devices for remote or branch office connectivity may face increased exposure, especially if the router's management interface is accessible from untrusted networks. The lack of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but service disruption and potential device compromise remain significant concerns. European entities with limited IT support or delayed patching processes may be particularly vulnerable to exploitation once public exploits emerge.

Mitigation Recommendations

European organizations should immediately audit their network infrastructure to identify the presence of Tenda AC10V4.0 routers running firmware version 16.03.10.20. If identified, restrict access to the router's management interface by implementing network segmentation and firewall rules to limit access to trusted internal IPs only. Disable remote management over WAN if enabled. Monitor network traffic for suspicious POST requests targeting the /goform/AdvSetMacMtuWan endpoint, especially those containing unusual or oversized serverName fields. Until an official patch is released, consider replacing vulnerable devices with updated models or alternative vendors with active security support. Employ network intrusion detection systems (NIDS) with custom signatures to detect exploitation attempts. Maintain up-to-date backups of router configurations to enable rapid recovery in case of device failure. Engage with Tenda support channels to obtain firmware updates or security advisories. Educate IT staff on the specific risks and signs of exploitation related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943060a0b6f32e62bf23030

Added to database: 12/17/2025, 7:35:38 PM

Last enriched: 12/24/2025, 8:30:56 PM

Last updated: 2/7/2026, 12:41:49 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats