A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac18 Firmware
CPEs cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*
Vendors & Products Tenda ac18 Firmware

Mon, 22 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac18
Vendors & Products Tenda
Tenda ac18

Sun, 21 Dec 2025 04:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Title Tenda AC18 HTTP Request GetParentControlInfo strcpy stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-22T14:57:17.553Z

Reserved: 2025-12-20T08:04:28.940Z

Link: CVE-2025-14992

cve-icon Vulnrichment

Updated: 2025-12-22T14:57:03.078Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-21T04:16:05.077

Modified: 2025-12-31T19:24:32.253

Link: CVE-2025-14992

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-22T11:40:16Z

Weaknesses