ID

VAR-202510-0056


CVE

CVE-2025-11388


TITLE

Tenda AC15 newVersion parameter stack buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-24388

DESCRIPTION

A vulnerability was identified in Tenda AC15 15.03.05.18. This impacts an unknown function of the file /goform/setNotUpgrade. Such manipulation of the argument newVersion leads to stack-based buffer overflow. The attack may be launched remotely. The exploit is publicly available and might be used. The Tenda AC15 is a dual-band wireless router launched by Shenzhen Jixiang Tengda Technology Co., Ltd. in October 2015. It supports the 802.11ac protocol and is designed primarily for home networking environments. This vulnerability stems from the failure of the parameter "newVersion" in the file "/goform/setNotUpgrade" to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 1.44

sources: NVD: CVE-2025-11388 // CNVD: CNVD-2025-24388

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24388

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:15.03.05.18

Trust: 1.6

sources: CNVD: CNVD-2025-24388 // NVD: CVE-2025-11388

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11388
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-24388
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-11388
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-24388
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11388
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-24388 // NVD: CVE-2025-11388

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-11388

EXTERNAL IDS

db:NVDid:CVE-2025-11388

Trust: 1.6

db:VULDBid:327315

Trust: 1.0

db:CNVDid:CNVD-2025-24388

Trust: 0.6

sources: CNVD: CNVD-2025-24388 // NVD: CVE-2025-11388

REFERENCES

url:https://github.com/noahze01/iot-vulnerable/blob/main/tenda/ac15/setnotupgrade.md

Trust: 1.6

url:https://vuldb.com/?ctiid.327315

Trust: 1.0

url:https://www.tenda.com.cn/

Trust: 1.0

url:https://vuldb.com/?id.327315

Trust: 1.0

url:https://vuldb.com/?submit.664974

Trust: 1.0

sources: CNVD: CNVD-2025-24388 // NVD: CVE-2025-11388

SOURCES

db:CNVDid:CNVD-2025-24388
db:NVDid:CVE-2025-11388

LAST UPDATE DATE

2025-11-19T23:24:56.547000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24388date:2025-10-21T00:00:00
db:NVDid:CVE-2025-11388date:2025-10-09T16:45:53.530

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24388date:2025-10-21T00:00:00
db:NVDid:CVE-2025-11388date:2025-10-07T11:16:02.800