CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-5853: Tenda AC6 SetRemoteWebCfg formSetSafeWanWebMan stack-based overflow

8.8 CVSS

Description

A vulnerability classified as critical was found in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. In Tenda AC6 15.03.05.16 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es die Funktion formSetSafeWanWebMan der Datei /goform/SetRemoteWebCfg. Mit der Manipulation des Arguments remoteIp mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-5853

CVSS Base Severity: HIGH

CVSS Base Score: 8.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem Types

Stack-based Buffer Overflow Memory Corruption

Affected Products

Vendor: Tenda

Product: AC6

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.09% (probability of being exploited)

EPSS Percentile: 27.34% (scored less or equal to compared to others)

EPSS Date: 2025-06-29 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2025-5853
https://vuldb.com/?id.311599
https://vuldb.com/?ctiid.311599
https://vuldb.com/?submit.591419
https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formSetSafeWanWebMan-20a53a41781f80f1a3ebc7931f32a29f?source=copy_link
https://www.tenda.com.cn/

Timeline