CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical remote buffer overflow vulnerability in Tenda AC7 router firmware version 15.03.06.44, affecting the LAN IP configuration function. An authenticated attacker can exploit improper input validation in the 'lanMask' parameter to achieve remote code execution with high confidentiality, integrity, and availability impact. Public exploit code is available and the vulnerability meets criteria for active exploitation.
Technical Context
The vulnerability exists in the fromadvsetlanip function within the /goform/AdvSetLanip endpoint of Tenda AC7 routers. This is a classic CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) buffer overflow affecting network device firmware. The affected component handles LAN mask configuration, a critical network parameter in residential/small business routing devices. Tenda AC7 is a budget-class AC1200 dual-band Wi-Fi router commonly deployed in home and SOHO environments. The lanMask parameter fails to implement adequate bounds checking before copying user-supplied input to a fixed-size buffer, allowing overflow of adjacent memory structures. This type of vulnerability is particularly dangerous in embedded device firmware where memory protections (DEP/ASLR) are often minimal or absent.
Affected Products
Tenda AC7 router firmware version 15.03.06.44 and potentially earlier/nearby versions. CPE string: cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*. Affected hardware model: Tenda AC7 (CPE: cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*). The vulnerability is specific to this firmware branch; other Tenda models and versions require independent assessment. Organizations running AC7 units should verify exact firmware version via router admin interface (typically System Tools > Firmware Upgrade page).
Remediation
Primary: Upgrade to the latest available Tenda AC7 firmware version beyond 15.03.06.44. Check Tenda's official support site (support.tenda.com.cn or regional equivalent) for firmware release notes confirming CVE-2025-5861 fix. Secondary mitigations if patching is delayed: (1) Restrict management access to LAN IP configuration endpoints via firewall rules at network perimeter; (2) Disable remote management features if not required (disable WAN-side access to /goform endpoints); (3) Change default admin credentials immediately; (4) Segment router management traffic to isolated administrative VLANs; (5) Monitor for suspicious configuration changes via router logs. Critical: Do NOT delay patching for extended periods, as buffer overflow exploits in router firmware often lead to complete device compromise and potential botnet enrollment.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17427