CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in Tenda AC5 router firmware (version 1.0/15.03.06.47) affecting the LAN IP configuration function. An authenticated attacker can remotely exploit improper input validation on the 'lanMask' parameter to achieve remote code execution with high confidentiality, integrity, and availability impact. Public exploit code is available and the vulnerability meets active exploitation criteria.
Technical Context
The vulnerability exists in the fromadvsetlanip function within the /goform/AdvSetLanip HTTP endpoint of Tenda AC5 wireless router firmware. This represents a classic CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) stack-based buffer overflow. The lanMask parameter, intended to receive a netmask value (typically dotted-decimal notation like 255.255.255.0), lacks proper bounds checking before being copied into a fixed-size stack buffer. The Tenda AC5 is a low-cost 802.11ac dual-band router commonly deployed in home and small business networks. The /goform endpoint is part of Tenda's web management interface, which processes configuration changes. CPE: cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*
Affected Products
Tenda AC5 Wireless Router - Firmware Version 15.03.06.47 (confirmed affected). Likely affects Tenda AC5 v1.0 hardware. CPE: cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*. Related firmware versions in the 15.03.06.x series may also be vulnerable pending vendor analysis. No official vendor patch release referenced in current advisories; Tenda has not published a security advisory or patched firmware version as of the CVE publication date.
Remediation
IMMEDIATE ACTIONS: (1) Restrict network access to the router's web management interface (port 80/443) using firewall rules or IP whitelisting—limit access to trusted administrative networks only. (2) Change default router credentials if present; enforce strong authentication. (3) Disable remote management features if not required. (4) Monitor Tenda's official security advisory page (https://www.tenda.com.cn/en/service/) for patched firmware release (version > 15.03.06.47). LONG-TERM: Upgrade to patched firmware once released by Tenda. If Tenda does not release a patch, consider replacing the device with firmware from vendors with active security maintenance. Implement network segmentation to isolate IoT/router management traffic.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17361