A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 02 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac23
Tenda ac23 Firmware
CPEs cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac23
Tenda ac23 Firmware

Tue, 30 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title Tenda AC23 SetIpMacBind fromSetIpMacBind stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-30T18:45:52.248Z

Reserved: 2025-12-28T15:36:47.477Z

Link: CVE-2025-15216

cve-icon Vulnrichment

Updated: 2025-12-30T18:45:49.505Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-30T03:15:51.707

Modified: 2026-01-02T21:29:14.983

Link: CVE-2025-15216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:23:01Z

Weaknesses