CVE-2025-8060: Stack-based Buffer Overflow in Tenda AC23
A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical. Affected by this vulnerability is the function sub_46C940 of the file /goform/setMacFilterCfg of the component httpd. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8060 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC23 router, specifically in firmware version 16.03.07.52. The flaw resides in the HTTP daemon component (httpd), within the function sub_46C940 that processes requests to the /goform/setMacFilterCfg endpoint. The vulnerability is triggered by manipulating the 'deviceList' argument, which leads to a stack-based buffer overflow condition. This type of overflow occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and enabling arbitrary code execution or denial of service. The vulnerability is remotely exploitable without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L), meaning an attacker with low privileges or access to the device's management interface could launch the attack over the network. The CVSS 4.0 base score of 8.7 classifies this as a high-severity issue, reflecting the significant impact on confidentiality, integrity, and availability (all rated high). Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The lack of an official patch or mitigation from the vendor at the time of publication further exacerbates the threat. Given the critical nature of the vulnerability and the widespread deployment of Tenda AC23 routers in consumer and small business environments, this vulnerability represents a serious security risk that could be leveraged for remote code execution, network compromise, or disruption of network services.
Potential Impact
For European organizations, the impact of CVE-2025-8060 can be substantial, particularly for small and medium enterprises (SMEs) and home office setups relying on Tenda AC23 routers for network connectivity. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the router. This can result in interception or manipulation of network traffic, unauthorized access to internal networks, disruption of internet connectivity, and potential pivoting to other critical systems. Confidentiality breaches could expose sensitive corporate data, while integrity violations might allow attackers to alter network configurations or inject malicious payloads. Availability could be impacted by denial-of-service conditions caused by the overflow or subsequent exploitation. Given the router’s role as a network gateway, exploitation could undermine perimeter defenses and facilitate broader cyberattacks. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations with limited IT security resources may be particularly vulnerable, emphasizing the need for prompt mitigation.
Mitigation Recommendations
To mitigate CVE-2025-8060 effectively, European organizations should take several specific steps beyond generic advice: 1) Immediately identify and inventory all Tenda AC23 devices running firmware version 16.03.07.52 within their networks. 2) Isolate affected devices from critical network segments and restrict management interface access to trusted IP addresses via firewall rules or VLAN segmentation. 3) Disable remote management features on the router if not strictly necessary, especially access to the /goform/setMacFilterCfg endpoint. 4) Monitor network traffic for unusual or malformed HTTP requests targeting the vulnerable endpoint, employing intrusion detection systems (IDS) or web application firewalls (WAF) with custom signatures. 5) Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available; if no official patch exists, consider replacing vulnerable devices with more secure alternatives. 6) Implement network-level protections such as VPNs or zero-trust access models to reduce exposure of management interfaces. 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for detecting and responding to exploitation attempts. 8) Regularly review and update router firmware and configurations as part of a comprehensive vulnerability management program.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-8060: Stack-based Buffer Overflow in Tenda AC23
Description
A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical. Affected by this vulnerability is the function sub_46C940 of the file /goform/setMacFilterCfg of the component httpd. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8060 is a critical stack-based buffer overflow vulnerability identified in the Tenda AC23 router, specifically in firmware version 16.03.07.52. The flaw resides in the HTTP daemon component (httpd), within the function sub_46C940 that processes requests to the /goform/setMacFilterCfg endpoint. The vulnerability is triggered by manipulating the 'deviceList' argument, which leads to a stack-based buffer overflow condition. This type of overflow occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and enabling arbitrary code execution or denial of service. The vulnerability is remotely exploitable without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L), meaning an attacker with low privileges or access to the device's management interface could launch the attack over the network. The CVSS 4.0 base score of 8.7 classifies this as a high-severity issue, reflecting the significant impact on confidentiality, integrity, and availability (all rated high). Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The lack of an official patch or mitigation from the vendor at the time of publication further exacerbates the threat. Given the critical nature of the vulnerability and the widespread deployment of Tenda AC23 routers in consumer and small business environments, this vulnerability represents a serious security risk that could be leveraged for remote code execution, network compromise, or disruption of network services.
Potential Impact
For European organizations, the impact of CVE-2025-8060 can be substantial, particularly for small and medium enterprises (SMEs) and home office setups relying on Tenda AC23 routers for network connectivity. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of the router. This can result in interception or manipulation of network traffic, unauthorized access to internal networks, disruption of internet connectivity, and potential pivoting to other critical systems. Confidentiality breaches could expose sensitive corporate data, while integrity violations might allow attackers to alter network configurations or inject malicious payloads. Availability could be impacted by denial-of-service conditions caused by the overflow or subsequent exploitation. Given the router’s role as a network gateway, exploitation could undermine perimeter defenses and facilitate broader cyberattacks. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations with limited IT security resources may be particularly vulnerable, emphasizing the need for prompt mitigation.
Mitigation Recommendations
To mitigate CVE-2025-8060 effectively, European organizations should take several specific steps beyond generic advice: 1) Immediately identify and inventory all Tenda AC23 devices running firmware version 16.03.07.52 within their networks. 2) Isolate affected devices from critical network segments and restrict management interface access to trusted IP addresses via firewall rules or VLAN segmentation. 3) Disable remote management features on the router if not strictly necessary, especially access to the /goform/setMacFilterCfg endpoint. 4) Monitor network traffic for unusual or malformed HTTP requests targeting the vulnerable endpoint, employing intrusion detection systems (IDS) or web application firewalls (WAF) with custom signatures. 5) Engage with Tenda support channels to obtain firmware updates or patches as soon as they become available; if no official patch exists, consider replacing vulnerable devices with more secure alternatives. 6) Implement network-level protections such as VPNs or zero-trust access models to reduce exposure of management interfaces. 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for detecting and responding to exploitation attempts. 8) Regularly review and update router firmware and configurations as part of a comprehensive vulnerability management program.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-22T20:41:12.236Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68803f41ad5a09ad0005fa36
Added to database: 7/23/2025, 1:47:45 AM
Last enriched: 7/23/2025, 2:02:50 AM
Last updated: 8/28/2025, 1:23:23 AM
Views: 27
Related Threats
CVE-2025-9605: Stack-based Buffer Overflow in Tenda AC21
CriticalCVE-2025-58323: CWE-266 Incorrect Privilege Assignment in NAVER NAVER MYBOX Explorer
UnknownCVE-2025-39247: Vulnerability in Hikvision HikCentral Professional
HighCVE-2025-39246: Vulnerability in Hikvision HikCentral FocSign
MediumCVE-2025-39245: Vulnerability in Hikvision HikCentral Master Lite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.