A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 Jan 2026 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Tenda ac18 Firmware
CPEs cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*
Vendors & Products Tenda ac18 Firmware

Tue, 23 Dec 2025 00:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 20:45:00 +0900

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac18
Vendors & Products Tenda
Tenda ac18

Sun, 21 Dec 2025 13:45:00 +0900

Type Values Removed Values Added
Description A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Title Tenda AC18 HTTP Request SetDlnaCfg sprintf stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-22T14:54:49.131Z

Reserved: 2025-12-20T08:04:33.686Z

Link: CVE-2025-14993

cve-icon Vulnrichment

Updated: 2025-12-22T14:54:41.732Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-21T05:16:05.340

Modified: 2025-12-31T15:52:33.037

Link: CVE-2025-14993

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-22T20:40:12Z

Weaknesses