CVE-2025-10815

A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/Juana-2u/Tenda-AC20 Not Applicable
https://vuldb.com/?ctiid.325173 Permissions Required VDB Entry
https://vuldb.com/?id.325173 Third Party Advisory VDB Entry
https://vuldb.com/?submit.654460 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*

History

25 Sep 2025, 18:07

Type Values Removed Values Added
First Time Tenda ac20
Tenda ac20 Firmware
Tenda
CPE cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*
References () https://github.com/Juana-2u/Tenda-AC20 - () https://github.com/Juana-2u/Tenda-AC20 - Not Applicable
References () https://vuldb.com/?ctiid.325173 - () https://vuldb.com/?ctiid.325173 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.325173 - () https://vuldb.com/?id.325173 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.654460 - () https://vuldb.com/?submit.654460 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

22 Sep 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-22 21:15

Updated : 2025-09-25 18:07


NVD link : CVE-2025-10815

Mitre link : CVE-2025-10815

CVE.ORG link : CVE-2025-10815


JSON object : View

Products Affected

tenda

  • ac20_firmware
  • ac20
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')