Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 17 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac18 Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac18 Firmware
|
|
| Metrics |
cvssV3_1
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac18 |
|
| Vendors & Products |
Tenda
Tenda ac18 |
Mon, 10 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the guestSsid parameter of the /goform/WifiGuestSet interface. Remote attackers can exploit this vulnerability by sending oversized data to the guestSsid parameter, leading to denial of service (device crash) or potential remote code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-18T16:31:59.502Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63835
Updated: 2025-11-18T16:31:44.939Z
Status : Modified
Published: 2025-11-10T17:15:35.960
Modified: 2025-11-18T17:16:13.363
Link: CVE-2025-63835
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:50:14Z