CVE-2025-7544: Stack-based Buffer Overflow in Tenda AC1206
A vulnerability was found in Tenda AC1206 15.03.06.23. It has been rated as critical. This issue affects the function formSetMacFilterCfg of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7544 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC1206 router, specifically in firmware version 15.03.06.23. The vulnerability resides in the function formSetMacFilterCfg within the /goform/setMacFilterCfg endpoint. This function processes the deviceList argument, which, when manipulated maliciously, leads to a stack-based buffer overflow condition. Such a vulnerability can allow an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service (DoS) by crashing the device. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as a high-severity issue. Although no public exploit is currently known to be actively used in the wild, the exploit details have been disclosed, increasing the risk of exploitation by threat actors. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as successful exploitation could allow attackers to take control of the router, intercept or manipulate network traffic, or disrupt network connectivity. The lack of available patches at the time of disclosure further exacerbates the risk for affected users. Given the critical nature of the router in network infrastructure, exploitation could have cascading effects on connected devices and organizational networks.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of Tenda networking equipment in small to medium enterprises and residential environments. Compromise of the Tenda AC1206 router could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations through denial of service. This is particularly concerning for organizations relying on these routers for perimeter security or remote access. The vulnerability could be leveraged by attackers to establish persistent footholds within networks, facilitating further lateral movement and data exfiltration. Additionally, critical infrastructure sectors that utilize such routers for connectivity may face operational disruptions. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals or state-sponsored actors to target vulnerable devices across Europe. The absence of patches at disclosure time means organizations must rely on mitigation strategies to reduce exposure, increasing operational complexity and risk.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda AC1206 devices from critical network segments to limit potential lateral movement in case of compromise. 2. Disable or restrict access to the /goform/setMacFilterCfg endpoint if possible, using firewall rules or router configuration settings to prevent unauthorized remote requests. 3. Monitor network traffic for unusual or malformed requests targeting the deviceList parameter or the /goform/setMacFilterCfg endpoint, employing intrusion detection/prevention systems (IDS/IPS) with custom signatures. 4. Implement strict access controls and limit management interface exposure to trusted IP addresses or VPN connections only. 5. Regularly audit and inventory network devices to identify all instances of Tenda AC1206 routers and verify firmware versions. 6. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 7. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments to models with no known vulnerabilities. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios involving network infrastructure devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7544: Stack-based Buffer Overflow in Tenda AC1206
Description
A vulnerability was found in Tenda AC1206 15.03.06.23. It has been rated as critical. This issue affects the function formSetMacFilterCfg of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7544 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC1206 router, specifically in firmware version 15.03.06.23. The vulnerability resides in the function formSetMacFilterCfg within the /goform/setMacFilterCfg endpoint. This function processes the deviceList argument, which, when manipulated maliciously, leads to a stack-based buffer overflow condition. Such a vulnerability can allow an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service (DoS) by crashing the device. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, categorizing it as a high-severity issue. Although no public exploit is currently known to be actively used in the wild, the exploit details have been disclosed, increasing the risk of exploitation by threat actors. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as successful exploitation could allow attackers to take control of the router, intercept or manipulate network traffic, or disrupt network connectivity. The lack of available patches at the time of disclosure further exacerbates the risk for affected users. Given the critical nature of the router in network infrastructure, exploitation could have cascading effects on connected devices and organizational networks.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of Tenda networking equipment in small to medium enterprises and residential environments. Compromise of the Tenda AC1206 router could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations through denial of service. This is particularly concerning for organizations relying on these routers for perimeter security or remote access. The vulnerability could be leveraged by attackers to establish persistent footholds within networks, facilitating further lateral movement and data exfiltration. Additionally, critical infrastructure sectors that utilize such routers for connectivity may face operational disruptions. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals or state-sponsored actors to target vulnerable devices across Europe. The absence of patches at disclosure time means organizations must rely on mitigation strategies to reduce exposure, increasing operational complexity and risk.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Tenda AC1206 devices from critical network segments to limit potential lateral movement in case of compromise. 2. Disable or restrict access to the /goform/setMacFilterCfg endpoint if possible, using firewall rules or router configuration settings to prevent unauthorized remote requests. 3. Monitor network traffic for unusual or malformed requests targeting the deviceList parameter or the /goform/setMacFilterCfg endpoint, employing intrusion detection/prevention systems (IDS/IPS) with custom signatures. 4. Implement strict access controls and limit management interface exposure to trusted IP addresses or VPN connections only. 5. Regularly audit and inventory network devices to identify all instances of Tenda AC1206 routers and verify firmware versions. 6. Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available and plan for prompt deployment. 7. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments to models with no known vulnerabilities. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios involving network infrastructure devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-12T13:30:51.339Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68742921a83201eaacbefc50
Added to database: 7/13/2025, 9:46:09 PM
Last enriched: 7/13/2025, 10:01:09 PM
Last updated: 7/16/2025, 8:32:56 PM
Views: 5
Related Threats
CVE-2025-34123: CWE-121 Stack-based Buffer Overflow in VideoCharge Software Studio
HighCVE-2025-34121: CWE-434 Unrestricted Upload of File with Dangerous Type in Idera Up.Time Monitoring Station
CriticalCVE-2025-34120: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LimeSurvey GmbH LimeSurvey
HighCVE-2025-34119: CWE-668 Exposure of Resource to Wrong Sphere in Tinasoft EasyCafe Server
HighCVE-2025-34118: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Linknat Technology VOS Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.