ID

VAR-202510-0111


CVE

CVE-2025-11356


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  ac23  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-015865

DESCRIPTION

A vulnerability was found in Tenda AC23 up to 16.03.07.52. Affected by this issue is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. of ac23 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. It offers dual-band concurrent transmission rates up to 2033 Mbps, with the 5 GHz band reaching up to 1733 Mbps. It is suitable for high-bandwidth applications such as 4K video and online live streaming. This vulnerability stems from the failure of the sscanf function in the file /goform/SetStaticRouteCfg to properly validate the length of the input data in the parameter list. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-11356 // JVNDB: JVNDB-2025-015865 // CNVD: CNVD-2025-24475

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24475

AFFECTED PRODUCTS

vendor:tendamodel:ac23scope:eqversion:16.03.07.52

Trust: 1.0

vendor:tendamodel:ac23scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac23scope:eqversion:ac23 firmware 16.03.07.52

Trust: 0.8

vendor:tendamodel:ac23scope: - version: -

Trust: 0.8

vendor:tendamodel:ac23scope:lteversion:<=16.03.07.52

Trust: 0.6

sources: CNVD: CNVD-2025-24475 // JVNDB: JVNDB-2025-015865 // NVD: CVE-2025-11356

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11356
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-015865
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-24475
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-11356
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-015865
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-24475
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11356
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-015865
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-24475 // JVNDB: JVNDB-2025-015865 // NVD: CVE-2025-11356

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-015865 // NVD: CVE-2025-11356

EXTERNAL IDS

db:NVDid:CVE-2025-11356

Trust: 3.2

db:VULDBid:327241

Trust: 1.8

db:JVNDBid:JVNDB-2025-015865

Trust: 0.8

db:CNVDid:CNVD-2025-24475

Trust: 0.6

sources: CNVD: CNVD-2025-24475 // JVNDB: JVNDB-2025-015865 // NVD: CVE-2025-11356

REFERENCES

url:https://github.com/cymiao1978/cve/blob/main/12.md

Trust: 2.4

url:https://vuldb.com/?id.327241

Trust: 1.8

url:https://vuldb.com/?submit.664923

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://vuldb.com/?ctiid.327241

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-11356

Trust: 0.8

sources: CNVD: CNVD-2025-24475 // JVNDB: JVNDB-2025-015865 // NVD: CVE-2025-11356

SOURCES

db:CNVDid:CNVD-2025-24475
db:JVNDBid:JVNDB-2025-015865
db:NVDid:CVE-2025-11356

LAST UPDATE DATE

2025-11-19T23:27:11.671000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24475date:2025-10-22T00:00:00
db:JVNDBid:JVNDB-2025-015865date:2025-10-14T06:52:00
db:NVDid:CVE-2025-11356date:2025-10-09T16:46:52.087

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24475date:2025-10-21T00:00:00
db:JVNDBid:JVNDB-2025-015865date:2025-10-14T00:00:00
db:NVDid:CVE-2025-11356date:2025-10-07T07:15:44.933