Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27216 | A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. |
Wed, 10 Sep 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac20 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac20 Firmware
|
Tue, 09 Sep 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac20 |
|
| Vendors & Products |
Tenda
Tenda ac20 |
Tue, 09 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Sep 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is the function strcpy of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. | |
| Title | Tenda AC20 GetParentControlInfo strcpy buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-09T14:06:35.948Z
Reserved: 2025-09-08T15:06:42.887Z
Link: CVE-2025-10120
Updated: 2025-09-09T14:06:19.845Z
Status : Analyzed
Published: 2025-09-09T02:15:38.293
Modified: 2025-09-10T16:41:54.140
Link: CVE-2025-10120
No data.
OpenCVE Enrichment
Updated: 2025-09-09T21:31:49Z
EUVD