Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-10432— Tenda AC1206 HTTP Request AdvSetMacMtuWa check_param_changed stack-based overflow

CVSS 9.8 · Critical EPSS 0.60% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-10432

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Tenda AC1206 HTTP Request AdvSetMacMtuWa check_param_changed stack-based overflow
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
栈缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tenda AC1206 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenda AC1206是中国腾达(Tenda)公司的一款无线千兆路由器。 Tenda AC1206 15.03.06.23版本存在安全漏洞,该漏洞源于HTTP Request Handler组件中文件/goform/AdvSetMacMtuWa的函数check_param_changed对参数wanMTU的错误操作,可能导致基于栈的缓冲区溢出。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
TendaAC1206 15.03.06.23 -

II. Public POCs for CVE-2025-10432

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-10432

登录查看更多情报信息。

Same Patch Batch · Tenda · 2025-09-15 · 3 CVEs total

CVE-2025-104438.8 HIGHTenda AC9/AC15 exeCommand formexeCommand buffer overflow
CVE-2025-104426.3 MEDIUMTenda AC9/AC15 exeCommand formexeCommand os command injection

IV. Related Vulnerabilities

V. Comments for CVE-2025-10432

No comments yet


Leave a comment