Vulnerability Description
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing a manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac18 Firmware | 15.03.05.19\(6318\) |
| Tenda | Ac18 | - |
Related Weaknesses (CWE)
References
- https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/AC18/fast_setting_pppExploitThird Party Advisory
- https://vuldb.com/?ctiid.327208Permissions RequiredVDB Entry
- https://vuldb.com/?id.327208Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.664527Third Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2025-11325?
CVE-2025-11325 is a vulnerability with a CVSS score of 8.8 (HIGH). A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing a manipulation of the a...
How severe is CVE-2025-11325?
CVE-2025-11325 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11325?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac18 Firmware, Tenda Ac18.