{"id":71225,"date":"2025-09-04T11:45:14","date_gmt":"2025-09-04T11:45:14","guid":{"rendered":""},"modified":"2025-09-28T05:36:53","modified_gmt":"2025-09-28T11:36:53","slug":"cve-2025-9605-stack-based-buffer-overflow-vulnerability-in-tenda-ac21-and-ac23-routers","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-9605-stack-based-buffer-overflow-vulnerability-in-tenda-ac21-and-ac23-routers\/","title":{"rendered":"<strong>CVE-2025-9605: Stack-Based Buffer Overflow Vulnerability in Tenda AC21 and AC23 Routers<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A critical vulnerability has been discovered in Tenda AC21 and AC23 routers, specifically in the 16.03.08.16 version. This security flaw, identified as CVE-2025-9605, exposes the routers to remote attacks, potentially leading to system compromise and data leakage. Given that Tenda routers are widely used globally, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-55293-high-risk-vulnerability-in-meshtastic-s-mesh-networking-solution\/\"  data-wpil-monitor-id=\"81336\">vulnerability poses a significant risk<\/a> to millions of Internet users, making it a matter of grave concern.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-9605<br \/>\nSeverity: Critical (9.8 CVSS Severity Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7384-php-object-injection-vulnerability-in-wordpress-plugin-leads-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"79053\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1355780424\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Tenda AC21| 16.03.08.16<br \/>\nTenda AC23| 16.03.08.16<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54653-path-traversal-vulnerability-in-virtualization-file-module\/\"  data-wpil-monitor-id=\"78861\">vulnerability lies in the GetParentControlInfo function of the file<\/a> \/goform\/GetParentControlInfo. The attack is based on manipulating the &#8216;mac&#8217; argument, which causes a stack-based <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48805-heap-based-buffer-overflow-in-microsoft-mpeg-2-video-extension\/\"  data-wpil-monitor-id=\"78864\">buffer overflow<\/a>. A <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8940-tenda-ac20-buffer-overflow-vulnerability\/\"  data-wpil-monitor-id=\"78865\">buffer overflow<\/a> occurs when more data is written into a block of memory, or buffer, than it can hold. In this case, the overflow occurs in the stack, a region of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-21125-serious-memory-corruption-vulnerability-leading-to-local-privilege-escalation\/\"  data-wpil-monitor-id=\"86043\">memory used for static data and local<\/a> variables.<br \/>\nAn attacker can exploit this vulnerability by sending specially crafted input to the affected function, causing the system to crash or <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46122-arbitrary-command-execution-vulnerability-in-commscope-ruckus-unleashed\/\"  data-wpil-monitor-id=\"78909\">execute arbitrary<\/a> code. Since the attack can be launched remotely, the attacker does not need physical access to the device, making it easier to exploit and harder to detect.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1459077429\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Given below is a conceptual example of how the vulnerability might be exploited. This is an HTTP POST request with a malicious payload, designed to exploit the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50130-heap-based-buffer-overflow-vulnerability-in-v-sft-and-tellus\/\"  data-wpil-monitor-id=\"78835\">buffer overflow vulnerability<\/a>:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/goform\/GetParentControlInfo HTTP\/1.1\nHost: target_router_ip\nContent-Type: application\/json\n{ &quot;mac&quot;: &quot;AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...&quot; }<\/code><\/pre>\n<p>In this example, the &#8216;mac&#8217; argument is overfilled with &#8216;A&#8217;s. This causes a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47987-buffer-overflow-vulnerability-in-windows-cred-ssprovider-protocol\/\"  data-wpil-monitor-id=\"78866\">buffer overflow<\/a> in the target system, potentially crashing it or allowing the execution of arbitrary code.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>Users of affected Tenda routers are strongly advised to apply the vendor patch as soon as possible. In the interim, Web Application Firewalls (WAF) or Intrusion Detection Systems (IDS) may serve as temporary mitigation measures. However, these are not long-term solutions and can only reduce the risk of exploit, not eliminate it. Therefore, applying the vendor patch remains the most effective way to secure <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-55708-sql-injection-vulnerability-in-expresstech-systems-quiz-and-survey-master\/\"  data-wpil-monitor-id=\"79119\">systems against this vulnerability<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A critical vulnerability has been discovered in Tenda AC21 and AC23 routers, specifically in the 16.03.08.16 version. This security flaw, identified as CVE-2025-9605, exposes the routers to remote attacks, potentially leading to system compromise and data leakage. Given that Tenda routers are widely used globally, this vulnerability poses a significant risk to millions of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[86],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-71225","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-buffer-overflow"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=71225"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71225\/revisions"}],"predecessor-version":[{"id":78837,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71225\/revisions\/78837"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=71225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=71225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=71225"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=71225"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=71225"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=71225"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=71225"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=71225"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=71225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}