A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/Tenda-AC23-SetIpMacBind-2d753a41781f8026a001f16e85226a21?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338601 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338601 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.725447 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-30 03:15
Updated : 2026-01-02 21:29
NVD link : CVE-2025-15216
Mitre link : CVE-2025-15216
CVE.ORG link : CVE-2025-15216
JSON object : View
Products Affected
tenda
- ac23_firmware
- ac23
