CVE-2025-14656

A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing a manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/Madgeaaaaa/MY_VULN_2/blob/main/Tenda/VULN14/AC20_openSchedWifi.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.336389 Permissions Required VDB Entry
https://vuldb.com/?id.336389 Third Party Advisory VDB Entry
https://vuldb.com/?submit.712917 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*

History

24 Feb 2026, 06:16

Type Values Removed Values Added
Summary (en) A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited. (en) A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing a manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

19 Dec 2025, 14:19

Type Values Removed Values Added
CPE cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*
References () https://github.com/Madgeaaaaa/MY_VULN_2/blob/main/Tenda/VULN14/AC20_openSchedWifi.md - () https://github.com/Madgeaaaaa/MY_VULN_2/blob/main/Tenda/VULN14/AC20_openSchedWifi.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.336389 - () https://vuldb.com/?ctiid.336389 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.336389 - () https://vuldb.com/?id.336389 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.712917 - () https://vuldb.com/?submit.712917 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda
Tenda ac20
Tenda ac20 Firmware

14 Dec 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-14 11:15

Updated : 2026-02-24 06:16


NVD link : CVE-2025-14656

Mitre link : CVE-2025-14656

CVE.ORG link : CVE-2025-14656


JSON object : View

Products Affected

tenda

  • ac20_firmware
  • ac20
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')