A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely.
History

Tue, 24 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely.
CPEs cpe:2.3:o:tenda:ac23_firmware:*:*:*:*:*:*:*:*

Fri, 02 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac23
Tenda ac23 Firmware
CPEs cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac23
Tenda ac23 Firmware

Tue, 30 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 03:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing manipulation of the argument list results in buffer overflow. The attack can be initiated remotely.
Title Tenda AC23 HTTP POST Request formSetPPTPUserList buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T06:13:47.735Z

Reserved: 2025-12-28T15:36:53.443Z

Link: CVE-2025-15217

cve-icon Vulnrichment

Updated: 2025-12-30T18:45:15.444Z

cve-icon NVD

Status : Modified

Published: 2025-12-30T03:15:51.887

Modified: 2026-02-24T07:17:04.063

Link: CVE-2025-15217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:22:53Z