Skip to main content

CVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20

High
VulnerabilityCVE-2025-9087cvecve-2025-9087
Published: Sat Aug 16 2025 (08/16/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AC20

Description

A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/16/2025, 23:02:46 UTC

Technical Analysis

CVE-2025-9087 is a high-severity stack-based buffer overflow vulnerability identified in the Tenda AC20 router, specifically in firmware version 16.03.08.12. The flaw exists in the function set_qosMib_list within the /goform/SetNetControlList endpoint. This function improperly handles the argument list, allowing an attacker to overflow the stack buffer. The vulnerability can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Successful exploitation could lead to arbitrary code execution on the device, compromising confidentiality, integrity, and availability. The vulnerability has been publicly disclosed, and although no known exploits are currently observed in the wild, the availability of exploit details increases the risk of active exploitation. The vulnerability does not require user interaction but does require low privileges (PR:L), which in the context of a router’s web interface may correspond to access to certain management functions. Given the nature of the vulnerability, attackers could potentially gain control over the router, manipulate network traffic, disrupt services, or use the device as a foothold for further network attacks. The lack of an official patch link suggests that users and administrators must be vigilant and seek firmware updates or mitigations from Tenda promptly.

Potential Impact

For European organizations, this vulnerability poses significant risks due to the widespread use of Tenda AC20 routers in small to medium business and home office environments. Compromise of these routers can lead to interception and manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate networks. Given the router’s role as a network gateway, attackers could bypass perimeter defenses, exfiltrate confidential information, or launch further attacks against internal systems. The high CVSS score reflects the critical impact on confidentiality, integrity, and availability. Additionally, the remote exploitability without user interaction increases the threat level, making automated attacks and worm-like propagation feasible. Organizations relying on Tenda AC20 devices without timely firmware updates or mitigations face increased exposure to espionage, data breaches, and operational disruptions, which are particularly sensitive under stringent European data protection regulations such as GDPR.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Tenda AC20 devices from critical network segments and restricting remote management access to trusted IPs or VPNs. Network administrators should monitor router logs for unusual activity related to the /goform/SetNetControlList endpoint and implement intrusion detection signatures targeting exploit attempts. Since no official patch is currently linked, organizations should contact Tenda support for firmware updates or advisories. As a temporary measure, disabling QoS management features or the vulnerable endpoint, if feasible, can reduce attack surface. Employ network segmentation to limit the impact of a compromised router and enforce strict access controls on router management interfaces. Regularly update router firmware once patches are released and conduct vulnerability scans to identify affected devices. Additionally, educating users about the risks and ensuring that default credentials are changed can help prevent unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-16T06:06:05.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a10a8ead5a09ad008649a1

Added to database: 8/16/2025, 10:47:42 PM

Last enriched: 8/16/2025, 11:02:46 PM

Last updated: 8/17/2025, 6:56:22 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats