Skip to main content

CVE-2025-8178: Heap-based Buffer Overflow in Tenda AC10

High
VulnerabilityCVE-2025-8178cvecve-2025-8178
Published: Sat Jul 26 2025 (07/26/2025, 04:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC10

Description

A vulnerability classified as critical has been found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /goform/RequestsProcessLaid. The manipulation of the argument device1D leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/26/2025, 05:02:41 UTC

Technical Analysis

CVE-2025-8178 is a critical heap-based buffer overflow vulnerability found in the Tenda AC10 router firmware version 16.03.10.13. The vulnerability exists in an unspecified function within the /goform/RequestsProcessLaid endpoint, where improper handling of the 'device1D' argument allows an attacker to overflow a heap buffer. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise. The attack vector is remote and does not require user interaction or prior authentication, making exploitation straightforward. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact metrics indicate high confidentiality, integrity, and availability impacts. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The vulnerability affects a widely deployed consumer-grade router model, which is commonly used in home and small office environments, potentially exposing many endpoints to compromise. The lack of available patches or vendor advisories at this time further exacerbates the risk.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC10 routers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and pivot into internal networks. This can lead to data breaches, espionage, disruption of business operations, and compromise of connected devices. Given the router's role as a network gateway, the vulnerability could be leveraged to bypass perimeter defenses. The absence of authentication and user interaction requirements means attackers can remotely exploit the vulnerability at scale, potentially targeting multiple organizations simultaneously. Critical infrastructure or organizations with remote workforces using vulnerable devices are at heightened risk. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks targeting European networks.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AC10 routers running firmware version 16.03.10.13. Until an official patch is released, it is recommended to isolate vulnerable devices from critical network segments and restrict remote management access via firewall rules or network segmentation. Disabling remote administration features on the router can reduce exposure. Network monitoring should be enhanced to detect anomalous traffic patterns or exploitation attempts targeting /goform/RequestsProcessLaid endpoints. Where possible, replace vulnerable devices with alternative models from vendors with timely security support. Organizations should subscribe to vendor advisories and CVE databases for updates on patches or mitigations. Employing intrusion prevention systems (IPS) with signatures targeting this vulnerability can provide temporary protection. Additionally, educating users about the risks of using outdated router firmware and encouraging regular updates is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T08:14:09.849Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68845df1ad5a09ad005b282c

Added to database: 7/26/2025, 4:47:45 AM

Last enriched: 7/26/2025, 5:02:41 AM

Last updated: 7/26/2025, 7:35:56 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats