Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:* |
Fri, 19 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac20 Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac20 Firmware
|
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac20 |
|
| Vendors & Products |
Tenda
Tenda ac20 |
Sun, 14 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. | |
| Title | Tenda AC20 httpd setPptpUserList formSetPPTPUserList stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:49:45.643Z
Reserved: 2025-12-13T09:48:02.488Z
Link: CVE-2025-14654
Updated: 2025-12-15T21:15:37.574Z
Status : Analyzed
Published: 2025-12-14T10:15:47.077
Modified: 2025-12-19T14:21:06.997
Link: CVE-2025-14654
No data.
OpenCVE Enrichment
Updated: 2025-12-15T14:06:01Z