Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda ac15 Firmware
         | 
|
| CPEs | cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Tenda ac15 Firmware
         | 
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda
         Tenda ac15  | 
|
| Vendors & Products | 
        
        Tenda
         Tenda ac15  | 
Tue, 07 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 07 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in Tenda AC15 15.03.05.18. The impacted element is an unknown function of the file /goform/SetDDNSCfg of the component POST Parameter Handler. The manipulation of the argument ddnsEn results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used. | |
| Title | Tenda AC15 POST Parameter SetDDNSCfg stack-based overflow | |
| Weaknesses | CWE-119 CWE-121  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV2_0
         
 
 
 
  | 
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-07T18:24:11.886Z
Reserved: 2025-10-06T19:27:46.950Z
Link: CVE-2025-11386
Updated: 2025-10-07T18:24:08.179Z
Status : Analyzed
Published: 2025-10-07T10:15:34.080
Modified: 2025-10-09T16:46:10.360
Link: CVE-2025-11386
No data.
                        OpenCVE Enrichment
                    Updated: 2025-10-08T13:38:47Z