Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8940: Buffer Overflow in Tenda AC20

0
High
VulnerabilityCVE-2025-8940cvecve-2025-8940
Published: Thu Aug 14 2025 (08/14/2025, 05:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:11:12 UTC

Technical Analysis

CVE-2025-8940 is a high-severity buffer overflow vulnerability affecting the Tenda AC20 router firmware versions up to 16.03.08.12. The flaw exists in the strcpy function within the /goform/saveParentControlInfo endpoint, specifically when processing the 'Time' argument. Because strcpy does not perform bounds checking, an attacker can supply a crafted input that exceeds the buffer size, causing a buffer overflow. This vulnerability can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, potentially allowing remote code execution or denial of service. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability does not require user interaction but does require low privileges (PR:L), which may correspond to an authenticated session or a low-level access vector. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. The Tenda AC20 is a widely used consumer and small office router, making this vulnerability relevant for environments relying on this device for network connectivity and security.

Potential Impact

For European organizations, the exploitation of CVE-2025-8940 could lead to significant network compromise. Successful exploitation could allow attackers to execute arbitrary code on the router, potentially gaining control over network traffic, intercepting sensitive data, or pivoting to internal systems. This threatens the confidentiality and integrity of organizational data and could disrupt availability by causing router crashes or network outages. Small and medium enterprises (SMEs) and home offices using Tenda AC20 devices are particularly at risk, as these routers are commonly deployed in such environments due to their cost-effectiveness. Compromise of these devices could facilitate broader attacks such as man-in-the-middle, data exfiltration, or lateral movement within corporate networks. Given the router’s role as a network gateway, the impact extends beyond the device itself to all connected systems, amplifying the potential damage. The lack of a patch and public exploit availability heighten the urgency for European organizations to address this vulnerability promptly.

Mitigation Recommendations

European organizations should immediately inventory their network infrastructure to identify any Tenda AC20 devices running affected firmware versions (up to 16.03.08.12). Until an official patch is released, organizations should implement network-level mitigations such as restricting access to the router’s management interfaces to trusted IP addresses only, ideally via VPN or internal network segments. Disable remote management features if not required. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting /goform/saveParentControlInfo or suspicious strcpy-related payloads. Regularly monitor router logs for anomalous activity. Where possible, replace vulnerable devices with models from vendors with timely security updates. Additionally, enforce strong network segmentation to limit the impact of a compromised router and maintain up-to-date backups of router configurations. Engage with Tenda support channels to obtain or request firmware updates addressing this vulnerability. Finally, educate IT staff about this vulnerability and the importance of rapid response to firmware updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T12:01:39.751Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e80abad5a09ad00602947

Added to database: 8/15/2025, 12:34:51 AM

Last enriched: 8/22/2025, 1:11:12 AM

Last updated: 11/12/2025, 4:31:05 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats