Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31477 | A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. |
Fri, 03 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac18 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac18_firmware:15.03.05.19:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac18 Firmware
|
Mon, 29 Sep 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 29 Sep 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac18 |
|
| Vendors & Products |
Tenda
Tenda ac18 |
Sun, 28 Sep 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. | |
| Title | Tenda AC18 WizardHandle stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-29T12:08:29.541Z
Reserved: 2025-09-27T17:51:34.144Z
Link: CVE-2025-11122
Updated: 2025-09-29T12:08:26.049Z
Status : Analyzed
Published: 2025-09-28T22:15:32.297
Modified: 2025-10-03T13:46:15.367
Link: CVE-2025-11122
No data.
OpenCVE Enrichment
Updated: 2025-09-29T09:29:30Z
EUVD