๐Ÿ” CVE Alert

CVE-2025-14992

HIGH 8.8

Tenda AC18 HTTP Request GetParentControlInfo strcpy stack-based overflow

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

CWE CWE-121 CWE-119
Vendor tenda
Product ac18
Published Dec 21, 2025
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for tenda ac18

Be the first to know when new high vulnerabilities affecting tenda ac18 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Tenda / AC18
15.03.05.05

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.337686 vuldb.com: https://vuldb.com/?ctiid.337686 vuldb.com: https://vuldb.com/?submit.719073 github.com: https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/Tenda_AC18/GetParentControlInfo/GetParentControlInfo.md github.com: https://github.com/z472421519/BinaryAudit/blob/main/PoC/BOF/Tenda_AC18/GetParentControlInfo/GetParentControlInfo.md#reproduce tenda.com.cn: https://www.tenda.com.cn/

Credits

๐Ÿ” z472421519 (VulDB User)