Skip to main content

CVE-2025-7586: Stack-based Buffer Overflow in Tenda AC500

High
VulnerabilityCVE-2025-7586cvecve-2025-7586
Published: Mon Jul 14 2025 (07/14/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC500

Description

A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. Affected by this vulnerability is the function formSetAPCfg of the file /goform/setWtpData. The manipulation of the argument radio_2g_1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 08:31:09 UTC

Technical Analysis

CVE-2025-7586 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC500 wireless access point, specifically affecting firmware version 2.0.1.9(1307). The flaw resides in the function formSetAPCfg within the /goform/setWtpData endpoint. An attacker can remotely manipulate the 'radio_2g_1' parameter, which is improperly handled, leading to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 score of 8.7 (high severity) reflects the ease of exploitation (network vector, low complexity), no required privileges or user interaction, and the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be actively used in the wild, the exploit code has been disclosed publicly, raising the likelihood of imminent exploitation attempts. The vulnerability affects a widely deployed consumer and small business wireless access point model, which is often used to provide network connectivity in homes and small offices. The lack of available patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts by affected users and organizations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, particularly for small and medium enterprises (SMEs) and home office environments that utilize Tenda AC500 devices. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to gain control over the device, intercept or manipulate network traffic, and potentially pivot to other internal systems. This could result in data breaches, disruption of business operations, and compromise of sensitive information. Given the critical nature of the flaw and the absence of authentication or user interaction requirements, attackers could automate attacks at scale, targeting vulnerable devices across Europe. The impact is heightened in sectors relying on secure wireless connectivity, such as healthcare, finance, and critical infrastructure, where compromised access points could undermine network integrity and confidentiality. Additionally, the public disclosure of exploit details increases the risk of opportunistic attacks, making timely response essential.

Mitigation Recommendations

Organizations and users should immediately assess their network environments for the presence of Tenda AC500 devices running firmware version 2.0.1.9(1307). In the absence of an official patch, the following specific mitigations are recommended: 1) Isolate vulnerable devices on segmented network zones with strict access controls to limit exposure. 2) Disable remote management interfaces or restrict access to trusted IP addresses only. 3) Monitor network traffic for unusual activity targeting the /goform/setWtpData endpoint or anomalous requests containing the 'radio_2g_1' parameter. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this vulnerability. 5) Where feasible, replace affected devices with models from vendors providing timely security updates. 6) Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 7) Educate network administrators about the vulnerability and encourage proactive incident response planning. These targeted actions go beyond generic advice by focusing on network segmentation, access restriction, and active monitoring specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T12:58:01.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874bcc3a83201eaacc37452

Added to database: 7/14/2025, 8:16:03 AM

Last enriched: 7/14/2025, 8:31:09 AM

Last updated: 7/16/2025, 1:33:21 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats