A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
History

Thu, 25 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac20 Firmware
CPEs cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda ac20 Firmware

Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac20
Vendors & Products Tenda
Tenda ac20
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
Title Tenda AC20 HTTP POST Request SetPptpServerCfg strcpy buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-09-22T21:02:08.431Z

Updated: 2025-09-23T16:02:43.704Z

Reserved: 2025-09-21T10:22:10.626Z

Link: CVE-2025-10815

cve-icon Vulnrichment

Updated: 2025-09-23T16:02:40.533Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-22T21:15:59.380

Modified: 2025-09-25T18:07:11.053

Link: CVE-2025-10815

cve-icon Redhat

No data.