CVE-2025-9087

has · has Multiple Products

A high-severity vulnerability has been identified in multiple Tenda products, including the Tenda AC20 router.

Executive summary

A high-severity vulnerability has been identified in multiple Tenda products, including the Tenda AC20 router. Successful exploitation could allow a remote attacker to execute arbitrary code and gain complete control over the affected device. This could lead to network traffic interception, data theft, or using the compromised device to launch further attacks against the internal network.

Vulnerability

This vulnerability is a stack-based buffer overflow in the web management interface of the affected devices. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted HTTP POST request to a specific endpoint on the device's web server. The server fails to properly validate the length of user-supplied input, allowing the attacker to overwrite the stack, control the instruction pointer, and achieve arbitrary code execution with root privileges on the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could lead to a complete compromise of the network device, granting an attacker a strategic foothold within the network perimeter. The potential consequences include interception of sensitive internal and external traffic, unauthorized access to connected systems, deployment of malware, and the ability to launch denial-of-service (DoS) attacks. For the organization, this translates to a high risk of data breaches, operational disruption, financial loss, and significant reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately to all affected devices. Prioritize patching for devices with management interfaces exposed to the internet. After patching, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity.

Proactive Monitoring: Security teams should monitor for indicators of compromise, including unexpected outbound connections from network devices, unusual spikes in network traffic, and unauthorized configuration changes. Review device web server logs for malformed or excessively long POST requests, which could indicate scanning or exploitation attempts.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Disable remote (WAN) administration of the device.
  • Restrict access to the device's management interface to a dedicated and trusted network segment.
  • Ensure a strong, unique administrative password is in use to hinder post-exploitation activities.
  • Implement network segmentation to limit the potential impact of a compromised edge device on critical internal assets.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability poses a significant risk to the organization. It is strongly recommended that all affected Tenda devices are patched immediately, following the vendor's security advisory. Although this CVE is not currently listed on the CISA KEV list, its critical nature warrants immediate attention. Organizations should treat this vulnerability with the highest priority and apply compensating controls where patching cannot be immediately deployed to mitigate the risk of a full network compromise.