Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 22 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerability is the function sscanf of the file /goform/SetPptpServerCfg of the component HTTP POST Request Handler. Such manipulation of the argument startIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | Tenda AC23 HTTP POST Request SetPptpServerCfg sscanf buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-22T15:02:07.142Z
Reserved: 2025-09-21T09:39:45.186Z
Link: CVE-2025-10803

No data.

Status : Received
Published: 2025-09-22T15:15:39.670
Modified: 2025-09-22T15:15:39.670
Link: CVE-2025-10803

No data.

No data.