ID

VAR-202509-1773


CVE

CVE-2025-10815


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC20  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-015043

DESCRIPTION

A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this issue is the function strcpy of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used. Shenzhen Tenda Technology Co.,Ltd. of AC20 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-10815 // JVNDB: JVNDB-2025-015043 // CNVD: CNVD-2025-24479

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24479

AFFECTED PRODUCTS

vendor:tendamodel:ac20scope:lteversion:16.03.08.12

Trust: 1.0

vendor:tendamodel:ac20scope: - version: -

Trust: 0.8

vendor:tendamodel:ac20scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac20scope:lteversion:ac20 firmware 16.03.08.12 and earlier

Trust: 0.8

vendor:tendamodel:ac20scope:lteversion:<=16.03.08.12

Trust: 0.6

sources: CNVD: CNVD-2025-24479 // JVNDB: JVNDB-2025-015043 // NVD: CVE-2025-10815

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-10815
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-015043
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-24479
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-10815
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-015043
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-24479
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-10815
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-015043
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-24479 // JVNDB: JVNDB-2025-015043 // NVD: CVE-2025-10815

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-015043 // NVD: CVE-2025-10815

EXTERNAL IDS

db:NVDid:CVE-2025-10815

Trust: 3.2

db:VULDBid:325173

Trust: 1.8

db:JVNDBid:JVNDB-2025-015043

Trust: 0.8

db:CNVDid:CNVD-2025-24479

Trust: 0.6

sources: CNVD: CNVD-2025-24479 // JVNDB: JVNDB-2025-015043 // NVD: CVE-2025-10815

REFERENCES

url:https://vuldb.com/?id.325173

Trust: 1.8

url:https://vuldb.com/?submit.654460

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://github.com/juana-2u/tenda-ac20

Trust: 1.6

url:https://vuldb.com/?ctiid.325173

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-10815

Trust: 0.8

sources: CNVD: CNVD-2025-24479 // JVNDB: JVNDB-2025-015043 // NVD: CVE-2025-10815

SOURCES

db:CNVDid:CNVD-2025-24479
db:JVNDBid:JVNDB-2025-015043
db:NVDid:CVE-2025-10815

LAST UPDATE DATE

2025-11-19T23:22:21.265000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24479date:2025-10-22T00:00:00
db:JVNDBid:JVNDB-2025-015043date:2025-10-03T09:22:00
db:NVDid:CVE-2025-10815date:2025-09-25T18:07:11.053

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24479date:2025-10-21T00:00:00
db:JVNDBid:JVNDB-2025-015043date:2025-10-03T00:00:00
db:NVDid:CVE-2025-10815date:2025-09-22T21:15:59.380