A vulnerability was found in Tenda AC20 16.03.08.05. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22570 A vulnerability was found in Tenda AC20 16.03.08.05. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 06 Aug 2025 04:45:00 +0900

Type Values Removed Values Added
First Time appeared Tenda ac20 Firmware
CPEs cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac20_firmware:16.03.08.05:*:*:*:*:*:*:*
Vendors & Products Tenda ac20 Firmware

Sat, 26 Jul 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac20
Vendors & Products Tenda
Tenda ac20

Fri, 25 Jul 2025 21:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Jul 2025 13:45:00 +0900

Type Values Removed Values Added
Description A vulnerability was found in Tenda AC20 16.03.08.05. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title Tenda AC20 SetStaticRouteCfg stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-07-25T11:55:59.091Z

Reserved: 2025-07-24T15:32:57.558Z

Link: CVE-2025-8131

cve-icon Vulnrichment

Updated: 2025-07-25T11:55:46.761Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-25T05:15:37.223

Modified: 2025-08-05T19:30:25.383

Link: CVE-2025-8131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-26T00:53:54Z

Weaknesses