CVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
A vulnerability was identified in Tenda AC20 16.03.08.12. This issue affects the function sub_46A2AC of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9046 is a high-severity stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw exists in the function sub_46A2AC within the /goform/setMacFilterCfg endpoint, which processes the deviceList argument. Improper handling of this argument allows an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This vulnerability can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The exploit manipulates the deviceList parameter to trigger the overflow, which could lead to arbitrary code execution, denial of service, or complete compromise of the device. Although no known exploits have been observed in the wild yet, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, given the high impact scores (VC:H/VI:H/VA:H). The Tenda AC20 is a consumer-grade wireless router commonly used in home and small office environments, making this vulnerability significant for network security. The lack of an official patch link suggests that mitigation options may currently be limited to workarounds or firmware updates from the vendor once available.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda AC20 routers, this vulnerability poses a substantial risk. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and pivot into internal networks. This could lead to data breaches, disruption of business operations, and compromise of connected devices. Given the remote and unauthenticated nature of the exploit, attackers could scan for vulnerable devices across Europe and launch automated attacks. The impact is particularly critical for organizations with limited IT security resources or those that have not updated their network equipment firmware regularly. Additionally, compromised routers could be used as part of botnets or for launching further attacks, amplifying the threat landscape in the region.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda AC20 devices from critical network segments to limit potential lateral movement. 2. Network administrators should monitor traffic for unusual patterns or attempts to access the /goform/setMacFilterCfg endpoint. 3. Implement network-level filtering to block or restrict access to the router’s management interface from untrusted networks, especially the WAN side. 4. Disable remote management features if enabled to reduce exposure. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models from vendors with a stronger security track record if patches are delayed. 7. Employ network intrusion detection systems (NIDS) to detect exploitation attempts targeting this vulnerability. 8. Educate users about the risks of using outdated router firmware and encourage proactive security hygiene.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
Description
A vulnerability was identified in Tenda AC20 16.03.08.12. This issue affects the function sub_46A2AC of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9046 is a high-severity stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw exists in the function sub_46A2AC within the /goform/setMacFilterCfg endpoint, which processes the deviceList argument. Improper handling of this argument allows an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This vulnerability can be exploited remotely without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The exploit manipulates the deviceList parameter to trigger the overflow, which could lead to arbitrary code execution, denial of service, or complete compromise of the device. Although no known exploits have been observed in the wild yet, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, given the high impact scores (VC:H/VI:H/VA:H). The Tenda AC20 is a consumer-grade wireless router commonly used in home and small office environments, making this vulnerability significant for network security. The lack of an official patch link suggests that mitigation options may currently be limited to workarounds or firmware updates from the vendor once available.
Potential Impact
For European organizations, especially small businesses and home offices relying on Tenda AC20 routers, this vulnerability poses a substantial risk. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and pivot into internal networks. This could lead to data breaches, disruption of business operations, and compromise of connected devices. Given the remote and unauthenticated nature of the exploit, attackers could scan for vulnerable devices across Europe and launch automated attacks. The impact is particularly critical for organizations with limited IT security resources or those that have not updated their network equipment firmware regularly. Additionally, compromised routers could be used as part of botnets or for launching further attacks, amplifying the threat landscape in the region.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda AC20 devices from critical network segments to limit potential lateral movement. 2. Network administrators should monitor traffic for unusual patterns or attempts to access the /goform/setMacFilterCfg endpoint. 3. Implement network-level filtering to block or restrict access to the router’s management interface from untrusted networks, especially the WAN side. 4. Disable remote management features if enabled to reduce exposure. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models from vendors with a stronger security track record if patches are delayed. 7. Employ network intrusion detection systems (NIDS) to detect exploitation attempts targeting this vulnerability. 8. Educate users about the risks of using outdated router firmware and encourage proactive security hygiene.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T19:29:47.175Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689f175dad5a09ad006b9aaa
Added to database: 8/15/2025, 11:17:49 AM
Last enriched: 8/15/2025, 11:32:45 AM
Last updated: 8/18/2025, 1:22:20 AM
Views: 11
Related Threats
CVE-2025-43732: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
MediumCVE-2025-9103: Cross Site Scripting in ZenCart
MediumCVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.