Cyber Posture

CVE-2025-1814

High

Published: 02 March 2025

Published
02 March 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1814 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Tenda Ac6 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the stack-based buffer overflow by requiring timely patching of the vulnerable /goform/WifiExtraSet functionality in Tenda AC6 firmware.

prevent

Information input validation prevents the buffer overflow by enforcing bounds checking and sanitization on the wpapsk_crypto argument manipulated remotely.

prevent

Memory protection mechanisms like stack canaries and non-executable stacks mitigate exploitation of the stack-based buffer overflow even if input validation fails.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in public web form (/goform/WifiExtraSet) directly enables remote code execution via network-accessible router interface.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is some unknown functionality of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may…

more

be launched remotely. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-1814 is a critical stack-based buffer overflow vulnerability (CVSS 3.1 score of 8.8) in Tenda AC6 router version 15.03.05.16. The flaw affects an unknown functionality within the /goform/WifiExtraSet file, where manipulation of the wpapsk_crypto argument triggers the overflow. It is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-121 (Stack-based Buffer Overflow), and CWE-787 (Out-of-bounds Write).

The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N), without impacting scope (S:U). Attackers can achieve high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), potentially leading to arbitrary code execution on the device. An exploit has been publicly disclosed and may be used.

Advisories on VulDB (ctiid.298082, id.298082, submit.506532) document the issue, with a proof-of-concept exploit detailed on GitHub at https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md. The Tenda vendor website is available at https://www.tenda.com.cn/.

Details

CWE(s)

Affected Products

tenda
ac6 firmware
15.03.05.16

CVEs Like This One

CVE-2026-4960Same product: Tenda Ac6
CVE-2026-4961Same product: Tenda Ac6
CVE-2025-0349Same product: Tenda Ac6
CVE-2025-12225Same product: Tenda Ac6
CVE-2025-32010Same product: Tenda Ac6
CVE-2025-29030Same product: Tenda Ac6
CVE-2025-29031Same product: Tenda Ac6
CVE-2025-52221Same product: Tenda Ac6
CVE-2025-7914Same product: Tenda Ac6
CVE-2025-27129Same product: Tenda Ac6

References