Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26135 | An input validation flaw in the 'ate' service of Tenda AC10 v4.0 firmware v16.03.10.09_multi_TDE01 to escalate privileges to root via a crafted UDP packet. |
Wed, 03 Sep 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac10 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac10_firmware:16.03.10.09_multi_tde01:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac10 Firmware
|
Mon, 01 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac10 |
|
| Vendors & Products |
Tenda
Tenda ac10 |
Thu, 28 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Thu, 28 Aug 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input validation flaw in the 'ate' service of Tenda AC10 v4.0 firmware v16.03.10.09_multi_TDE01 to escalate privileges to root via a crafted UDP packet. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-28T20:20:21.748Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57220
Updated: 2025-08-28T20:20:17.121Z
Status : Analyzed
Published: 2025-08-28T19:15:33.963
Modified: 2025-09-03T16:11:06.807
Link: CVE-2025-57220
No data.
OpenCVE Enrichment
Updated: 2025-09-01T09:02:57Z
EUVD