Severity
8.7HIGH
EPSS
1.2%
top 21.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 3
Latest updateDec 16

Description

A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDtenda/ac7_firmware< 15.03.06.44
CVEListV5tenda/ac745 versions+44

🔴Vulnerability Details

3
OSV
mm: don't spin in add_stack_record when gfp flags don't allow2025-12-16
CVEList
Tenda AC7 SetFirewallCfg formSetFirewallCfg stack-based overflow2025-03-03
GHSA
GHSA-cwwg-82jm-w98g: A vulnerability, which was classified as critical, was found in Tenda AC7 up to 152025-03-03

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Tenda SetFirewallCfg firewallEn Parameter Buffer Overflow Attempt (CVE-2025-8810, CVE-2025-29358, CVE-2025-1851, CVE-2024-2809)2025-10-10

📋Vendor Advisories

2
Red Hat
kernel: mm: don't spin in add_stack_record when gfp flags don't allow2025-12-16
Microsoft
Out-of-bounds Read in vim/vim2022-05-10