Skip to main content

CVE-2025-8178: Heap-based Buffer Overflow in Tenda AC10

High
VulnerabilityCVE-2025-8178cvecve-2025-8178
Published: Sat Jul 26 2025 (07/26/2025, 04:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC10

Description

A vulnerability classified as critical has been found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /goform/RequestsProcessLaid. The manipulation of the argument device1D leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/03/2025, 00:59:51 UTC

Technical Analysis

CVE-2025-8178 is a critical heap-based buffer overflow vulnerability found in the Tenda AC10 router firmware version 16.03.10.13. The vulnerability resides in an unspecified function within the /goform/RequestsProcessLaid endpoint, where improper handling of the 'device1D' argument allows an attacker to overflow a heap buffer. This type of vulnerability can corrupt memory, potentially enabling remote code execution or denial of service conditions. The attack vector is remote and does not require user interaction or prior authentication, making exploitation straightforward. The vulnerability has a CVSS 4.0 base score of 8.7 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent exploitation. The lack of available patches or mitigation from the vendor at this time further exacerbates the threat. Given the nature of the vulnerability and the widespread use of Tenda AC10 routers in home and small office environments, attackers could leverage this flaw to gain persistent unauthorized access, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC10 routers, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept sensitive communications, inject malicious payloads, or pivot into internal networks. This threatens confidentiality by exposing private data, integrity by allowing manipulation of network traffic, and availability by potentially causing router crashes or network outages. Critical infrastructure or organizations with remote workforces using vulnerable devices may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly in environments where these routers are deployed without additional network segmentation or monitoring. The absence of vendor patches means organizations must rely on alternative mitigations to reduce exposure.

Mitigation Recommendations

1. Immediate mitigation should include isolating the Tenda AC10 routers from direct internet exposure by placing them behind firewalls or VPNs to restrict access to the vulnerable /goform/RequestsProcessLaid endpoint. 2. Network administrators should implement strict access control lists (ACLs) to limit inbound traffic to trusted IP addresses only. 3. Monitor network traffic for unusual requests targeting the /goform/RequestsProcessLaid path or anomalous behavior indicative of exploitation attempts. 4. Where feasible, replace or upgrade affected devices to models with updated firmware or from vendors with timely security support. 5. Employ network segmentation to limit the impact of a compromised router on critical internal systems. 6. Regularly audit device firmware versions and maintain an inventory of network equipment to quickly identify vulnerable devices. 7. Engage with Tenda support channels to obtain or request security patches or official guidance. 8. Educate users about the risks of using outdated router firmware and encourage prompt updates once patches become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T08:14:09.849Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68845df1ad5a09ad005b282c

Added to database: 7/26/2025, 4:47:45 AM

Last enriched: 8/3/2025, 12:59:51 AM

Last updated: 9/6/2025, 3:42:13 PM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats