ID

VAR-202506-0364


CVE

CVE-2025-5794


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC5  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-006594

DESCRIPTION

A vulnerability, which was classified as critical, has been found in Tenda AC5 15.03.06.47. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC5 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter list in the file /goform/setPptpUserList failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack

Trust: 2.16

sources: NVD: CVE-2025-5794 // JVNDB: JVNDB-2025-006594 // CNVD: CNVD-2025-14296

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-14296

AFFECTED PRODUCTS

vendor:tendamodel:ac5scope:eqversion:15.03.06.47

Trust: 1.6

vendor:tendamodel:ac5scope: - version: -

Trust: 0.8

vendor:tendamodel:ac5scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac5scope:eqversion:ac5 firmware 15.03.06.47

Trust: 0.8

sources: CNVD: CNVD-2025-14296 // JVNDB: JVNDB-2025-006594 // NVD: CVE-2025-5794

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5794
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-006594
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-14296
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5794
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-006594
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-14296
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5794
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-006594
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-14296 // JVNDB: JVNDB-2025-006594 // NVD: CVE-2025-5794

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006594 // NVD: CVE-2025-5794

PATCH

title:Patch for Tenda AC5 /goform/setPptpUserList file buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/702406

Trust: 0.6

sources: CNVD: CNVD-2025-14296

EXTERNAL IDS

db:NVDid:CVE-2025-5794

Trust: 3.2

db:VULDBid:311348

Trust: 1.8

db:JVNDBid:JVNDB-2025-006594

Trust: 0.8

db:CNVDid:CNVD-2025-14296

Trust: 0.6

sources: CNVD: CNVD-2025-14296 // JVNDB: JVNDB-2025-006594 // NVD: CVE-2025-5794

REFERENCES

url:https://lavender-bicycle-a5a.notion.site/tenda-ac5-formsetpptpuserlist-20a53a41781f806faf61cef61ed929c0?source=copy_link

Trust: 2.4

url:https://vuldb.com/?id.311348

Trust: 1.8

url:https://vuldb.com/?submit.591223

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://lavender-bicycle-a5a.notion.site/tenda-ac5-formsetpptpuserlist-20a53a41781f806faf61cef61ed929c0

Trust: 1.8

url:https://vuldb.com/?ctiid.311348

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5794

Trust: 0.8

sources: CNVD: CNVD-2025-14296 // JVNDB: JVNDB-2025-006594 // NVD: CVE-2025-5794

SOURCES

db:CNVDid:CNVD-2025-14296
db:JVNDBid:JVNDB-2025-006594
db:NVDid:CVE-2025-5794

LAST UPDATE DATE

2025-07-01T23:21:33.421000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-14296date:2025-06-30T00:00:00
db:JVNDBid:JVNDB-2025-006594date:2025-06-10T07:06:00
db:NVDid:CVE-2025-5794date:2025-06-09T19:08:21.053

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-14296date:2025-06-26T00:00:00
db:JVNDBid:JVNDB-2025-006594date:2025-06-10T00:00:00
db:NVDid:CVE-2025-5794date:2025-06-06T19:15:28.393