Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda
Tenda ac15 |
|
Vendors & Products |
Tenda
Tenda ac15 |
Tue, 07 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Tenda AC15 15.03.05.18. The impacted element is an unknown function of the file /goform/SetDDNSCfg of the component POST Parameter Handler. The manipulation of the argument ddnsEn results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used. | |
Title | Tenda AC15 POST Parameter SetDDNSCfg stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-07T18:24:11.886Z
Reserved: 2025-10-06T19:27:46.950Z
Link: CVE-2025-11386

Updated: 2025-10-07T18:24:08.179Z

Status : Awaiting Analysis
Published: 2025-10-07T10:15:34.080
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-11386

No data.

Updated: 2025-10-08T13:38:47Z