Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda ac23 Firmware
         | 
|
| CPEs | cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Tenda ac23 Firmware
         | 
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda
         Tenda ac23  | 
|
| Vendors & Products | 
        
        Tenda
         Tenda ac23  | 
Tue, 07 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 06 Oct 2025 22:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in Tenda AC23 up to 16.03.07.52. Affected by this issue is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. | |
| Title | Tenda AC23 SetStaticRouteCfg sscanf buffer overflow | |
| Weaknesses | CWE-119 CWE-120  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV2_0
         
 
 
 
  | 
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-07T18:13:39.826Z
Reserved: 2025-10-06T06:33:20.887Z
Link: CVE-2025-11356
Updated: 2025-10-07T18:13:34.725Z
Status : Analyzed
Published: 2025-10-07T07:15:44.933
Modified: 2025-10-09T16:46:52.087
Link: CVE-2025-11356
No data.
                        OpenCVE Enrichment
                    Updated: 2025-10-08T13:38:42Z