Cyber Posture

CVE-2025-1814

High

Published: 02 March 2025

Published
02 March 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is some unknown functionality of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Security Summary

CVE-2025-1814 is a critical stack-based buffer overflow vulnerability (CVSS 3.1 score of 8.8) in Tenda AC6 router version 15.03.05.16. The flaw affects an unknown functionality within the /goform/WifiExtraSet file, where manipulation of the wpapsk_crypto argument triggers the overflow. It is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-121 (Stack-based Buffer Overflow), and CWE-787 (Out-of-bounds Write).

The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N), without impacting scope (S:U). Attackers can achieve high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), potentially leading to arbitrary code execution on the device. An exploit has been publicly disclosed and may be used.

Advisories on VulDB (ctiid.298082, id.298082, submit.506532) document the issue, with a proof-of-concept exploit detailed on GitHub at https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md. The Tenda vendor website is available at https://www.tenda.com.cn/.

Details

CWE(s)
CWE-119CWE-121CWE-787

Affected Products

tenda
ac6 firmware
15.03.05.16

References