Directory traversal vulnerability in Omnispace Agora Project before 25
Description
Directory traversal vulnerability in Omnispace Agora Project before 25
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical buffer overflow vulnerability has been identified in multiple Tenda networking products. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted web request, which could cause the device to crash or potentially allow the attacker to take complete control. This presents a severe risk of network disruption, data interception, and further intrusions into the connected network.
Vulnerability Details
CVE-ID: CVE-2025-67073
Affected Software: Tenda Multiple Products (httpd service)
Affected Versions: Tenda AC10V4.0 V16.03.10.20 is confirmed to be affected. See vendor advisory for a complete list of specific affected products and versions.
Vulnerability: This is a buffer overflow vulnerability located in the
fromAdvSetMacMtuWanfunction within the device'shttpdweb server binary. An unauthenticated remote attacker can trigger this vulnerability by sending a specifically crafted POST request to the/goform/AdvSetMacMtuWanendpoint. The function does not properly validate the length of the user-supplied input for theserviceNamefield. By providing an overly long string in this field, an attacker can overwrite adjacent memory on the stack, leading to a crash (Denial of Service) or, with a carefully constructed payload, arbitrary code execution with the privileges of the web server process.Business Impact
This vulnerability is rated as critical with a CVSS score of 9.8, reflecting the high potential for significant damage. Successful exploitation could grant an attacker complete control over the affected network device. This could lead to severe business consequences, including the interception of sensitive network traffic, redirection of users to malicious websites, modification of network configurations, and using the compromised device as a pivot point to attack other systems on the internal network. The most immediate impact is the potential for a Denial of Service, which would disrupt all internet and network connectivity for users relying on the device.
Remediation Plan
Immediate Action: Update the firmware on all affected Tenda devices to the latest version provided by the vendor. After applying the update, monitor for any further exploitation attempts and review web access logs for indicators of compromise preceding the patch.
Proactive Monitoring:
/goform/AdvSetMacMtuWanURI.serviceNameparameter or requests that resulted in server errors or crashes.httpdservice.Compensating Controls:
serviceNameparameter sent to the vulnerable endpoint.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 17, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the nature of buffer overflow vulnerabilities in widely deployed consumer networking equipment, it is highly likely that a functional proof-of-concept exploit will be developed and made public in the near future.
Analyst Recommendation
This vulnerability represents a critical risk to the organization due to its high severity and potential for remote code execution. Immediate patching of all affected Tenda devices should be considered the highest priority. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical CVSS score warrants urgent attention. Organizations should apply the vendor-supplied firmware updates without delay and implement the recommended monitoring and compensating controls to mitigate risk.