A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 24 Sep 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac23 Firmware
CPEs cpe:2.3:h:tenda:ac23:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac23_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda ac23 Firmware

Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac23
Vendors & Products Tenda
Tenda ac23

Mon, 22 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title Tenda AC23 HTTP POST Request SetPptpServerCfg sscanf buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-09-22T15:02:07.142Z

Updated: 2025-09-22T17:18:36.553Z

Reserved: 2025-09-21T09:39:45.186Z

Link: CVE-2025-10803

cve-icon Vulnrichment

Updated: 2025-09-22T17:17:44.152Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-22T15:15:39.670

Modified: 2025-09-24T20:25:18.200

Link: CVE-2025-10803

cve-icon Redhat

No data.