Cyber Posture

CVE-2025-25663

CriticalPublic PoC

Published: 20 February 2025

Published
20 February 2025
Modified
17 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25663 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Tenda Ac8 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents stack-based buffer overflow by validating the wpapsk_crypto argument in /goform/WifiExtraSet before processing.

prevent

Provides memory protections such as stack canaries to mitigate exploitation of the buffer overflow vulnerability even if invalid input reaches the function.

prevent

Requires timely remediation of the identified buffer overflow flaw in Tenda AC8V4 firmware version V16.03.34.06 to eliminate the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in the public-facing web interface (/goform/WifiExtraSet) enables remote code execution via exploitation of a public-facing application.

NVD Description

A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow.

Deeper analysisAI

CVE-2025-25663 is a stack-based buffer overflow vulnerability affecting Tenda AC8V4 router firmware version V16.03.34.06. The flaw exists in the SUB_0046AC38 function of the /goform/WifiExtraSet file, where manipulation of the wpapsk_crypto argument triggers the overflow. It maps to CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), and was published on 2025-02-20.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability enables exploitation over the network with low complexity, requiring no authentication or user interaction. Unauthenticated remote attackers can achieve high-impact effects on confidentiality, integrity, and availability, likely leading to arbitrary code execution on the device.

Technical details on the vulnerability, including exploitation specifics, are documented in the advisory at https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/WifiExtraSet.md. No patch or mitigation guidance is specified in the available description.

Details

CWE(s)

Affected Products

tenda
ac8 firmware
16.03.34.06

CVEs Like This One

CVE-2024-57703Same product: Tenda Ac8
CVE-2025-25664Same product: Tenda Ac8
CVE-2025-25668Same product: Tenda Ac8
CVE-2024-57704Same product: Tenda Ac8
CVE-2025-25667Same product: Tenda Ac8
CVE-2026-2202Same product: Tenda Ac8
CVE-2025-1853Same product: Tenda Ac8
CVE-2026-4254Same product: Tenda Ac8
CVE-2025-29100Same product: Tenda Ac8
CVE-2025-51087Same product: Tenda Ac8

References