First published: Mon Mar 03 2025(Updated: )
A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC8 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1853 is classified as critical due to the potential for a stack-based buffer overflow.
To fix CVE-2025-1853, you should update the Tenda AC8 firmware to the latest version provided by Tenda.
CVE-2025-1853 affects the Parameter Handler of the Tenda AC8 router.
CVE-2025-1853 involves a stack-based buffer overflow caused by improper argument handling in a specific function.
CVE-2025-1853 specifically impacts the Tenda AC8 model.