CVE-2025-12611

was · was Multiple Products

A high-severity vulnerability has been discovered in multiple Tenda products, including the Tenda AC21 router.

Executive summary

A high-severity vulnerability has been discovered in multiple Tenda products, including the Tenda AC21 router. This flaw could allow a remote, unauthenticated attacker to gain complete control over an affected device, potentially leading to data theft, network disruption, and further attacks on the internal network. Organizations are urged to apply the vendor-provided security patches immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a stack-based buffer overflow within the device's web server process that handles administrative functions. An unauthenticated attacker on the same network, or remotely if the management interface is exposed to the internet, can send a specially crafted HTTP POST request with an overly long value to a specific parameter. This action overwrites the program's stack, allowing the attacker to execute arbitrary code with root-level privileges on the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation would grant an attacker complete administrative control over the network device. This could lead to severe business consequences, including the interception of sensitive network traffic, unauthorized access to internal network resources, and the ability to launch further attacks from a trusted position within the network. The compromised device could also be co-opted into a botnet for use in large-scale Distributed Denial of Service (DDoS) attacks, causing reputational damage and potential service disruption.

Remediation

Immediate Action: The primary remediation is to apply the security updates released by the vendor to all affected devices immediately. Before and after patching, it is critical to monitor for any signs of compromise. Review system and access logs for unusual activity, unexpected reboots, or configuration changes that could indicate a breach occurred prior to the patch being applied.

Proactive Monitoring: Implement enhanced monitoring on network traffic to and from affected devices. Look for suspicious outbound connections to unknown IP addresses, anomalous traffic spikes, or repeated connection attempts to the device's management interface. Intrusion Detection Systems (IDS) should be updated with signatures to detect exploitation of this vulnerability if they become available.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Disable remote/WAN management of the device to prevent attacks from the internet.
  • Use a firewall to restrict access to the device's management interface to only trusted administrative workstations.
  • Implement network segmentation to isolate the vulnerable device from critical servers and sensitive corporate assets.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical nature of this vulnerability (CVSS 8.8), which allows for remote code execution, we strongly recommend that organizations prioritize the immediate patching of all affected Tenda devices. While this CVE is not currently on the CISA KEV list, its high impact score makes it a prime candidate for future inclusion and an attractive target for attackers. In addition to patching, organizations should ensure that compensating controls, such as disabling WAN management, are implemented as a standard security best practice to harden these critical network devices against future threats.