Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac18_firmware:*:*:*:*:*:*:*:* |
Wed, 31 Dec 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac18 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac18 Firmware
|
Mon, 22 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac18 |
|
| Vendors & Products |
Tenda
Tenda ac18 |
Sun, 21 Dec 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. | |
| Title | Tenda AC18 HTTP Request GetParentControlInfo strcpy stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:59:49.072Z
Reserved: 2025-12-20T08:04:28.940Z
Link: CVE-2025-14992
Updated: 2025-12-22T14:57:03.078Z
Status : Analyzed
Published: 2025-12-21T04:16:05.077
Modified: 2025-12-31T19:24:32.253
Link: CVE-2025-14992
No data.
OpenCVE Enrichment
Updated: 2025-12-22T11:40:16Z