CVE-2025-9023: Buffer Overflow in Tenda AC7
A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9023 is a high-severity buffer overflow vulnerability affecting Tenda AC7 and AC18 routers running firmware versions 15.03.05.19 and 15.03.06.44. The flaw exists in the formSetSchedLed function within the /goform/SetLEDCfg endpoint. Specifically, the vulnerability arises from improper handling of the 'Time' argument, which can be manipulated to cause a buffer overflow condition. This vulnerability is exploitable remotely without authentication or user interaction, as the affected endpoint is accessible over the network. The CVSS 4.0 base score is 8.7, reflecting the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Successful exploitation could allow an attacker to execute arbitrary code on the device, potentially leading to full compromise of the router. This could enable attackers to intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects widely deployed consumer and small business routers, which are often used as gateways in home and office networks, making this a critical concern for network security.
Potential Impact
For European organizations, this vulnerability poses significant risks. Many enterprises and small businesses rely on Tenda routers for network connectivity, especially in small office/home office (SOHO) environments. Exploitation could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. Given the remote exploitability without authentication, attackers can target vulnerable devices directly from the internet, increasing the attack surface. This can facilitate lateral movement into corporate networks or enable attackers to launch further attacks such as man-in-the-middle, data exfiltration, or ransomware deployment. The impact is particularly severe for organizations handling sensitive personal data or critical infrastructure, as compromise could lead to data breaches or operational outages. Additionally, compromised routers can be conscripted into botnets, amplifying threats to broader internet stability and security within Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all Tenda AC7 and AC18 routers running the affected firmware versions (15.03.05.19 and 15.03.06.44) within their networks. Immediate steps include isolating these devices from untrusted networks and restricting remote management access to trusted IPs only. Network segmentation should be enforced to limit the impact of any potential compromise. Since no official patches are currently available, organizations should monitor Tenda's security advisories closely for firmware updates addressing this issue and apply them promptly once released. As an interim measure, disabling the LED scheduling feature or blocking access to the /goform/SetLEDCfg endpoint via firewall rules can reduce exposure. Employing network intrusion detection systems (NIDS) to monitor for suspicious traffic targeting this endpoint is recommended. Additionally, organizations should educate users about the risks and encourage regular firmware updates as a best practice. Finally, consider deploying network-level protections such as VPNs and strong authentication to reduce exposure of management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9023: Buffer Overflow in Tenda AC7
Description
A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9023 is a high-severity buffer overflow vulnerability affecting Tenda AC7 and AC18 routers running firmware versions 15.03.05.19 and 15.03.06.44. The flaw exists in the formSetSchedLed function within the /goform/SetLEDCfg endpoint. Specifically, the vulnerability arises from improper handling of the 'Time' argument, which can be manipulated to cause a buffer overflow condition. This vulnerability is exploitable remotely without authentication or user interaction, as the affected endpoint is accessible over the network. The CVSS 4.0 base score is 8.7, reflecting the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Successful exploitation could allow an attacker to execute arbitrary code on the device, potentially leading to full compromise of the router. This could enable attackers to intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects widely deployed consumer and small business routers, which are often used as gateways in home and office networks, making this a critical concern for network security.
Potential Impact
For European organizations, this vulnerability poses significant risks. Many enterprises and small businesses rely on Tenda routers for network connectivity, especially in small office/home office (SOHO) environments. Exploitation could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. Given the remote exploitability without authentication, attackers can target vulnerable devices directly from the internet, increasing the attack surface. This can facilitate lateral movement into corporate networks or enable attackers to launch further attacks such as man-in-the-middle, data exfiltration, or ransomware deployment. The impact is particularly severe for organizations handling sensitive personal data or critical infrastructure, as compromise could lead to data breaches or operational outages. Additionally, compromised routers can be conscripted into botnets, amplifying threats to broader internet stability and security within Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all Tenda AC7 and AC18 routers running the affected firmware versions (15.03.05.19 and 15.03.06.44) within their networks. Immediate steps include isolating these devices from untrusted networks and restricting remote management access to trusted IPs only. Network segmentation should be enforced to limit the impact of any potential compromise. Since no official patches are currently available, organizations should monitor Tenda's security advisories closely for firmware updates addressing this issue and apply them promptly once released. As an interim measure, disabling the LED scheduling feature or blocking access to the /goform/SetLEDCfg endpoint via firewall rules can reduce exposure. Employing network intrusion detection systems (NIDS) to monitor for suspicious traffic targeting this endpoint is recommended. Additionally, organizations should educate users about the risks and encourage regular firmware updates as a best practice. Finally, consider deploying network-level protections such as VPNs and strong authentication to reduce exposure of management interfaces.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T07:07:03.862Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689ef437ad5a09ad00697379
Added to database: 8/15/2025, 8:47:51 AM
Last enriched: 8/15/2025, 9:02:53 AM
Last updated: 11/10/2025, 10:20:27 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12405: CWE-269: Improper Privilege Management in Google Cloud Looker Studio
HighCVE-2025-41107: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in QDOCS Smart Schoo
MediumCVE-2025-12155: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Google Cloud Looker
HighCVE-2025-12409: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker Studio
HighCVE-2025-12397: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Google Cloud Looker Studio
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.