CVE-2025-11525
Published: 09 October 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-11525 is a stack-based buffer overflow vulnerability affecting the Tenda AC7 router running firmware version 15.03.06.44. The flaw exists in an unknown function of the /goform/SetUpnpCfg file, where manipulation of the upnpEn argument triggers the overflow. Published on 2025-10-09, it is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), earning a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An attacker with low privileges, such as an authenticated user with network access, can remotely exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows high-impact consequences, including unauthorized disclosure of information, modification of data, and denial of service, potentially enabling full control over the affected router.
Advisories reference a public exploit disclosure on GitHub at https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/AC7/SetUpnpCfg.md, along with VulDB entries (https://vuldb.com/?ctiid.327663, https://vuldb.com/?id.327663, https://vuldb.com/?submit.669853, https://vuldb.com/?submit.669860). No patches or specific mitigations are detailed in the available information, and the exploit may be actively used.
The vulnerability's public exploit disclosure heightens risks for unpatched Tenda AC7 devices, particularly in environments with exposed routers and weak authentication.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Stack-based buffer overflow in the web management interface (/goform/SetUpnpCfg) of the Tenda AC7 router is remotely exploitable, enabling exploitation of a public-facing application for potential remote code execution.