CVE-2025-14992
Published: 21 December 2025
Description
A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation…
more
of the attack is possible. The exploit has been disclosed publicly and may be used.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of the 'mac' argument in the HTTP request to prevent the stack-based buffer overflow triggered by unrestricted input in GetParentControlInfo.
SI-16 enforces memory protections such as stack canaries and address space layout randomization to mitigate exploitation of the stack buffer overflow in the strcpy function.
SI-2 mandates timely identification, reporting, and correction of the specific buffer overflow flaw in the Tenda AC18 firmware, eliminating the vulnerability.
Security SummaryAI
CVE-2025-14992 is a stack-based buffer overflow vulnerability affecting the Tenda AC18 router on firmware version 15.03.05.05. The flaw exists in the strcpy function within the /goform/GetParentControlInfo endpoint of the HTTP Request Handler component, where manipulation of the "mac" argument triggers the overflow.
The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). Attackers can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with an unchanged scope (S:U), resulting in a CVSS v3.1 base score of 8.8. It is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
Advisories and references, including VulDB entries and a GitHub repository, provide details on the vulnerability but do not specify patches or mitigations. A public proof-of-concept is available, including reproduction steps for the buffer overflow in the Tenda AC18's GetParentControlInfo function.
The exploit has been publicly disclosed and may be used by attackers.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remotely exploitable stack-based buffer overflow in the HTTP request handler of a public-facing router web interface, directly enabling exploitation of public-facing applications.