CVE-2025-11418
Published: 08 October 2025
Description
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Security Summary
CVE-2025-11418 is a stack-based buffer overflow vulnerability affecting Tenda CH22 routers up to version 1.0.0.1. The issue resides in the formWrlsafeset function within the /goform/AdvSetWrlsafeset file of the HTTP Request Handler component, where manipulation of the mit_ssid_index argument triggers the overflow. It is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
The vulnerability enables remote exploitation by unauthenticated attackers without requiring user interaction or special privileges. Attackers can send crafted HTTP requests to the affected endpoint, leading to potential arbitrary code execution with high impacts on confidentiality, integrity, and availability.
Advisories referenced in VulDB entries (ctiid.327354, id.327354, submit.665615) and a GitHub issue (Sxxxw/cve/issues/2) document the vulnerability and public disclosure of an exploit, while the Tenda website (tenda.com.cn) provides general product information. No specific patches or mitigations are detailed in the available references. The exploit has been publicly disclosed and may be used.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unauthenticated remote stack-based buffer overflow in the public-facing router's HTTP management endpoint (/goform/AdvSetWrlsafeset) enables exploitation for initial access (T1190), remote code execution (T1210), and denial of service via crash (T1499.004).