CVE-2025-14656

A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing a manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/Madgeaaaaa/MY_VULN_2/blob/main/Tenda/VULN14/AC20_openSchedWifi.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.336389 Permissions Required VDB Entry
https://vuldb.com/?id.336389 Third Party Advisory VDB Entry
https://vuldb.com/?submit.712917 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-14 11:15

Updated : 2026-02-24 06:16


NVD link : CVE-2025-14656

Mitre link : CVE-2025-14656

CVE.ORG link : CVE-2025-14656


JSON object : View

Products Affected

tenda

  • ac20_firmware
  • ac20
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')