CVE-2025-9605

A security vulnerability has been detected in Tenda AC21 and AC23 16.03.08.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. Such manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac21_firmware:16.03.08.16:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac21:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tenda:ac23_firmware:16.03.08.16:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*

History

03 Sep 2025, 16:10

Type Values Removed Values Added
First Time Tenda ac23
Tenda ac21
Tenda ac23 Firmware
Tenda ac21 Firmware
Tenda
CPE cpe:2.3:o:tenda:ac23_firmware:16.03.08.16:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac21:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac21_firmware:16.03.08.16:*:*:*:*:*:*:*
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC21/AC21V1.0re_V16.03.08.16.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC21/AC21V1.0re_V16.03.08.16.md - Exploit, Third Party Advisory
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC23/Stack-Based%20Buffer%20Overflow%20in%20Tenda%20Wi-Fi%205%20Router%20AC23%EF%BC%88AC23V1.0re_V16.03.07.52%EF%BC%89.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC23/Stack-Based%20Buffer%20Overflow%20in%20Tenda%20Wi-Fi%205%20Router%20AC23%EF%BC%88AC23V1.0re_V16.03.07.52%EF%BC%89.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.321783 - () https://vuldb.com/?ctiid.321783 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.321783 - () https://vuldb.com/?id.321783 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.636545 - () https://vuldb.com/?submit.636545 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.636548 - () https://vuldb.com/?submit.636548 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

29 Aug 2025, 14:15

Type Values Removed Values Added
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC21/AC21V1.0re_V16.03.08.16.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC21/AC21V1.0re_V16.03.08.16.md -
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC23/Stack-Based%20Buffer%20Overflow%20in%20Tenda%20Wi-Fi%205%20Router%20AC23%EF%BC%88AC23V1.0re_V16.03.07.52%EF%BC%89.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC23/Stack-Based%20Buffer%20Overflow%20in%20Tenda%20Wi-Fi%205%20Router%20AC23%EF%BC%88AC23V1.0re_V16.03.07.52%EF%BC%89.md -

29 Aug 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-29 03:15

Updated : 2025-09-03 16:10


NVD link : CVE-2025-9605

Mitre link : CVE-2025-9605

CVE.ORG link : CVE-2025-9605


JSON object : View

Products Affected

tenda

  • ac23
  • ac23_firmware
  • ac21_firmware
  • ac21
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow