CVE-2025-14654
Published: 14 December 2025
Description
A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely.…
more
The exploit is publicly available and might be used.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of inputs to the formSetPPTPUserList function to directly prevent stack-based buffer overflows from manipulated argument lists.
Mandates timely flaw remediation by applying firmware patches to eliminate the buffer overflow vulnerability in Tenda AC20 httpd.
Implements memory protections such as stack canaries, ASLR, and non-executable memory to mitigate exploitation of the stack-based buffer overflow.
Security SummaryAI
CVE-2025-14654 is a stack-based buffer overflow vulnerability affecting Tenda AC20 routers running firmware version 16.03.08.12. The flaw resides in the formSetPPTPUserList function within the /goform/setPptpUserList file of the httpd component. Manipulation of the argument list triggers the overflow, as documented in the CVE published on 2025-12-14. It is associated with CWEs 119, 121, and 787.
The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Remote attackers with low privileges can exploit it without user interaction, potentially achieving high impacts on confidentiality, integrity, and availability, such as arbitrary code execution.
Advisories on VulDB (ctiid.336387, id.336387, submit.712899) detail the issue, while a GitHub repository at https://github.com/Madgeaaaaa/MY_VULN_2/blob/main/Tenda/VULN12/AC20_SetPptpUserList.md provides a publicly available exploit that might be used. The Tenda website (https://www.tenda.com.cn/) is referenced, but no specific patches or mitigations are outlined in the available information.
The exploit's public availability increases the risk of real-world exploitation against unpatched Tenda AC20 devices.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote stack-based buffer overflow in Tenda AC20 router's public-facing httpd web interface (/goform/setPptpUserList) enables exploitation for initial access (T1190/T1210) and denial-of-service via application crash (T1499.004); PoC supports RCE/DoS.