CVE-2025-10443

Tenda · Tenda AC9 and AC15 Routers

A high-severity vulnerability has been discovered in certain Tenda router models, which could allow a remote, unauthenticated attacker to execute arbitrary code and gain complete control of the affect.

Executive summary

A high-severity vulnerability has been discovered in certain Tenda router models, which could allow a remote, unauthenticated attacker to execute arbitrary code and gain complete control of the affected device. Successful exploitation could lead to significant network breaches, data theft, or disruption of services, posing a critical risk to the organization's network integrity. Immediate patching is required to mitigate this threat.

Vulnerability

The vulnerability is a stack-based buffer overflow within the web management interface of the affected Tenda routers. An unauthenticated remote attacker can exploit this by sending a specially crafted POST request to the device. This overflows a buffer, allowing the attacker to overwrite critical stack data and achieve arbitrary code execution with root-level privileges on the router.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete administrative control over the network router, a critical component of the network perimeter. Potential consequences include interception and redirection of network traffic, eavesdropping on sensitive communications, compromising other internal systems by pivoting from the router, and using the device in a botnet for larger-scale attacks. This poses a significant risk of data breaches, financial loss, and reputational damage.

Remediation

Immediate Action: Apply vendor-supplied security updates to all affected Tenda AC9 and AC15 routers immediately. Patches should be downloaded from the official Tenda support website and installed according to the vendor's instructions. After patching, monitor for any signs of post-remediation exploitation attempts and review device access logs for any suspicious activity that occurred prior to the update.

Proactive Monitoring: Security teams should monitor for indicators of compromise, including unexpected outbound connections from the routers, unauthorized configuration changes (especially to DNS settings), and unusual spikes in network traffic. Review router web server logs for malformed POST requests or repeated access attempts from unknown IP addresses.

Compensating Controls: If patching cannot be performed immediately, disable WAN-side (internet-facing) management of the router's web interface. If remote administration is required, restrict access to a limited set of trusted IP addresses using firewall rules. Consider network segmentation to limit the potential impact of a compromised router on other critical internal assets.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability presents a critical risk and must be addressed with urgency. Organizations using affected Tenda AC9 and AC15 routers should prioritize the deployment of vendor patches across all vulnerable devices. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a likely candidate for future inclusion. If patching is delayed for any reason, the compensating controls outlined above must be implemented immediately as a temporary mitigation.