ID

VAR-202506-0242


CVE

CVE-2025-5607


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC18  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007249

DESCRIPTION

A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. of AC18 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Attackers can use this vulnerability to submit special requests and execute arbitrary commands

Trust: 2.16

sources: NVD: CVE-2025-5607 // JVNDB: JVNDB-2025-007249 // CNVD: CNVD-2025-12756

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12756

AFFECTED PRODUCTS

vendor:tendamodel:ac18scope:eqversion:15.03.05.05

Trust: 1.0

vendor:tendamodel:ac18scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac18scope:eqversion:ac18 firmware 15.03.05.05

Trust: 0.8

vendor:tendamodel:ac18scope: - version: -

Trust: 0.8

vendor:tendamodel:ac18scope:eqversion:v15.03.05.05

Trust: 0.6

sources: CNVD: CNVD-2025-12756 // JVNDB: JVNDB-2025-007249 // NVD: CVE-2025-5607

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5607
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-007249
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-12756
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5607
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-007249
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12756
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5607
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-007249
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12756 // JVNDB: JVNDB-2025-007249 // NVD: CVE-2025-5607

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007249 // NVD: CVE-2025-5607

PATCH

title:Patch for Tenda AC18 /goform/setPptpUserList buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/698556

Trust: 0.6

sources: CNVD: CNVD-2025-12756

EXTERNAL IDS

db:NVDid:CVE-2025-5607

Trust: 3.2

db:VULDBid:311093

Trust: 1.8

db:JVNDBid:JVNDB-2025-007249

Trust: 0.8

db:CNVDid:CNVD-2025-12756

Trust: 0.6

sources: CNVD: CNVD-2025-12756 // JVNDB: JVNDB-2025-007249 // NVD: CVE-2025-5607

REFERENCES

url:https://lavender-bicycle-a5a.notion.site/tenda-ac18-formsetpptpuserlist-20653a41781f809fba95ff2c0a5c921b?source=copy_link

Trust: 1.8

url:https://vuldb.com/?id.311093

Trust: 1.8

url:https://vuldb.com/?submit.588934

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/?ctiid.311093

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5607

Trust: 0.8

url:https://lavender-bicycle-a5a.notion.site/tenda-ac18-formsetpptpuserlist-20653a41781f809fba95ff2c0a5c921b

Trust: 0.6

sources: CNVD: CNVD-2025-12756 // JVNDB: JVNDB-2025-007249 // NVD: CVE-2025-5607

SOURCES

db:CNVDid:CNVD-2025-12756
db:JVNDBid:JVNDB-2025-007249
db:NVDid:CVE-2025-5607

LAST UPDATE DATE

2025-06-20T23:15:12.544000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12756date:2025-06-18T00:00:00
db:JVNDBid:JVNDB-2025-007249date:2025-06-19T05:28:00
db:NVDid:CVE-2025-5607date:2025-06-17T20:40:56.660

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12756date:2025-06-16T00:00:00
db:JVNDBid:JVNDB-2025-007249date:2025-06-19T00:00:00
db:NVDid:CVE-2025-5607date:2025-06-04T20:15:24.630