CVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9087 is a high-severity stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw exists in the function set_qosMib_list within the /goform/SetNetControlList endpoint. This endpoint processes network control list parameters, and improper handling of the argument list allows an attacker to overflow a stack buffer. The vulnerability can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Successful exploitation can lead to arbitrary code execution with elevated privileges, compromising the confidentiality, integrity, and availability of the affected device. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently observed in the wild. Given the critical role of routers in network infrastructure, exploitation could allow attackers to intercept, manipulate, or disrupt network traffic, pivot to internal networks, or establish persistent footholds.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Tenda AC20 routers in small to medium enterprises and home office environments. Compromise of these routers could lead to unauthorized access to internal networks, data interception, and disruption of business operations. Critical sectors such as finance, healthcare, and government agencies that rely on secure network infrastructure could face data breaches or service outages. Additionally, compromised routers could be leveraged as part of botnets or for launching further attacks within European networks, amplifying the threat landscape. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in organizations with limited network segmentation or outdated firmware management practices.
Mitigation Recommendations
Organizations should immediately identify all Tenda AC20 devices running firmware version 16.03.08.12 and prioritize their remediation. Since no official patch links are currently available, mitigation should include: 1) Restricting access to the router management interfaces by implementing network-level controls such as firewall rules to limit access only to trusted IP addresses; 2) Disabling remote management features if not required; 3) Monitoring network traffic for unusual activity indicative of exploitation attempts; 4) Employing intrusion detection/prevention systems with signatures for this vulnerability once available; 5) Planning and executing firmware upgrades as soon as vendor patches are released; 6) For critical environments, consider temporary replacement of affected devices with alternative hardware until patched. Additionally, organizations should enforce strong network segmentation to limit the impact of any compromised device.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
Description
A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9087 is a high-severity stack-based buffer overflow vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw exists in the function set_qosMib_list within the /goform/SetNetControlList endpoint. This endpoint processes network control list parameters, and improper handling of the argument list allows an attacker to overflow a stack buffer. The vulnerability can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Successful exploitation can lead to arbitrary code execution with elevated privileges, compromising the confidentiality, integrity, and availability of the affected device. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently observed in the wild. Given the critical role of routers in network infrastructure, exploitation could allow attackers to intercept, manipulate, or disrupt network traffic, pivot to internal networks, or establish persistent footholds.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Tenda AC20 routers in small to medium enterprises and home office environments. Compromise of these routers could lead to unauthorized access to internal networks, data interception, and disruption of business operations. Critical sectors such as finance, healthcare, and government agencies that rely on secure network infrastructure could face data breaches or service outages. Additionally, compromised routers could be leveraged as part of botnets or for launching further attacks within European networks, amplifying the threat landscape. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in organizations with limited network segmentation or outdated firmware management practices.
Mitigation Recommendations
Organizations should immediately identify all Tenda AC20 devices running firmware version 16.03.08.12 and prioritize their remediation. Since no official patch links are currently available, mitigation should include: 1) Restricting access to the router management interfaces by implementing network-level controls such as firewall rules to limit access only to trusted IP addresses; 2) Disabling remote management features if not required; 3) Monitoring network traffic for unusual activity indicative of exploitation attempts; 4) Employing intrusion detection/prevention systems with signatures for this vulnerability once available; 5) Planning and executing firmware upgrades as soon as vendor patches are released; 6) For critical environments, consider temporary replacement of affected devices with alternative hardware until patched. Additionally, organizations should enforce strong network segmentation to limit the impact of any compromised device.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-16T06:06:05.154Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a10a8ead5a09ad008649a1
Added to database: 8/16/2025, 10:47:42 PM
Last enriched: 8/24/2025, 1:03:52 AM
Last updated: 11/14/2025, 9:12:50 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10686: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Creta Testimonial Showcase
UnknownCVE-2025-64444: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Sony Network Communications Inc. NCP-HG100/Cellular model
HighCVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.