CVE Alert: CVE-2025-11526 – Tenda – AC7

CVE-2025-11526

HIGHNo exploitation known

A vulnerability was found in Tenda AC7 15.03.06.44. The affected element is an unknown function of the file /goform/WifiMacFilterSet. Performing manipulation of the argument wifi_chkHz results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.

CVSS v3.1 (8.8)
Vendor
Tenda
Product
AC7
Versions
15.03.06.44
CWE
CWE-121, Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-09T02:32:10.251Z
Updated
2025-10-09T02:32:10.251Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated code execution is possible and a public exploit exists.

Why this matters

An attacker could take full control of the device, exposing network traffic and enabling lateral movement to other hosts. The high impact on confidentiality, integrity and availability means device compromise could disrupt operations and broader network security.

Most likely attack path

Based on AV:N, AC:L, PR:L, UI:N, S:U with a PoC-exploitation state, an attacker can trigger the stack overflow over the network without user interaction. Successful exploitation yields code execution within the device with low privileges, but—given the high impact—could enable persistent access and network pivoting.

Who is most exposed

Commonly deployed in home and small business environments with Internet-facing or easily reachable admin interfaces; devices in IoT-heavy networks are particularly at risk when management ports are accessible from WAN or unsegmented LANs.

Detection ideas

  • Unexplained device reboots or crashes with memory corruption symptoms.
  • Logs or alerts showing attempts to access /goform/WifiMacFilterSet or overflow indicators.
  • Suspicious network traffic patterns to/from the device’s management interface.
  • Public PoC indicators or signature-like traffic from known exploit activity.
  • Anomalous memory usage or core dumps tied to wifi_chkHz handling.

Mitigation and prioritisation

  • Apply vendor firmware patch as soon as available; verify integrity before deployment.
  • If patch is unavailable, disable or restrict remote management and WAN admin access; implement strict ACLs.
  • Place affected devices on a segmented network with enforced egress filtering and monitor for anomalous activity.
  • Expedite change-management and test patches in a lab before production rollout.
  • If KEV is confirmed or EPSS score is ≥0.5, treat as priority 1. Note: data not shown here; confirm KEV/EPSS to adjust prioritisation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.