CVE-2025-12595
Tenda · Tenda AC23 Firmware
A high-severity vulnerability has been discovered in Tenda AC23 router firmware that could allow a remote, unauthenticated attacker to take complete control of the affected device.
Executive summary
A high-severity vulnerability has been discovered in Tenda AC23 router firmware that could allow a remote, unauthenticated attacker to take complete control of the affected device. Successful exploitation could lead to network traffic interception, denial of service, or the compromise of the internal network. Organizations are urged to apply the vendor-provided security patch immediately to mitigate the significant risk of a system compromise.
Vulnerability
This vulnerability is a stack-based buffer overflow within the web server component of the Tenda AC23 firmware. An unauthenticated attacker on the same network (or remotely, if WAN management is enabled) can send a specially crafted HTTP POST request to the device's management interface. The server fails to properly validate the length of user-supplied input, leading to an overflow that can overwrite the return address on the stack, allowing the attacker to execute arbitrary code with root-level privileges on the device.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would result in a complete compromise of the network device, granting an attacker full administrative control. The potential business impact includes the loss of data confidentiality, as the attacker could intercept all unencrypted network traffic passing through the router. The integrity of the network is at risk, as the attacker could redirect traffic to malicious sites or use the device to launch further attacks against the internal network. Finally, the availability of network services could be impacted if the attacker renders the device inoperable or uses it as part of a DDoS botnet.
Remediation
Immediate Action: The primary remediation is to apply the security update provided by the vendor immediately. Disconnect affected devices from the internet if patching cannot be performed right away. After patching, review system and access logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: System administrators should monitor network traffic for anomalous HTTP requests directed at the router's management interface, especially from untrusted sources. Monitor for unexpected device reboots, unexplained configuration changes, or high CPU utilization. Employ network intrusion detection systems (NIDS) to look for signatures associated with this CVE as they become available.
Compensating Controls: If immediate patching is not feasible, the following compensating controls should be implemented:
- Disable remote (WAN) administration of the device.
- Use an access control list (ACL) to restrict access to the device's management interface to only trusted IP addresses or a dedicated management VLAN.
- Ensure a strong, unique administrative password is configured for the device to hinder any potential post-exploitation activity.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the potential for remote code execution, this vulnerability poses a significant threat to the organization. We strongly recommend that all affected Tenda AC23 devices be patched immediately, prioritizing those that are internet-facing or protect critical network segments. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. If patching must be delayed, the compensating controls listed above should be implemented as a temporary but less effective mitigation strategy.