Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-25015 | A vulnerability was identified in Tenda AC20 16.03.08.12. This issue affects the function sub_46A2AC of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda ac20 Firmware
         | 
|
| CPEs | cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Tenda ac20 Firmware
         | 
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Tenda
         Tenda ac20  | 
|
| Vendors & Products | 
        
        Tenda
         Tenda ac20  | 
Fri, 15 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Fri, 15 Aug 2025 11:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was identified in Tenda AC20 16.03.08.12. This issue affects the function sub_46A2AC of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda AC20 setMacFilterCfg sub_46A2AC stack-based overflow | |
| Weaknesses | CWE-119 CWE-121  | 
|
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV2_0
         
 
 
 
  | 
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-08-15T13:18:35.050Z
Reserved: 2025-08-14T19:29:47.175Z
Link: CVE-2025-9046
Updated: 2025-08-15T13:18:30.247Z
Status : Analyzed
Published: 2025-08-15T11:15:29.993
Modified: 2025-08-18T15:10:16.310
Link: CVE-2025-9046
No data.
                        OpenCVE Enrichment
                    Updated: 2025-08-16T21:40:47Z
 EUVD