A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
History

Fri, 03 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac18
Tenda ac18 Firmware
CPEs cpe:2.3:h:tenda:ac18:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac18_firmware:16.03.34.06:*:*:*:*:*:*:*
Vendors & Products Tenda ac18
Tenda ac18 Firmware

Mon, 29 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 29 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac8
Vendors & Products Tenda
Tenda ac8

Sun, 28 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
Title Tenda AC8 SetServerConfig formSetServerConfig buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-09-29T14:06:07.932Z

Reserved: 2025-09-27T17:47:12.856Z

Link: CVE-2025-11120

cve-icon Vulnrichment

Updated: 2025-09-29T14:05:57.272Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-28T21:15:51.167

Modified: 2025-10-03T13:42:17.047

Link: CVE-2025-11120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-29T09:29:29Z