A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/Tenda-AC23-SetIpMacBind-2d753a41781f8026a001f16e85226a21?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338601 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338601 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.725447 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Jan 2026, 21:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lavender-bicycle-a5a.notion.site/Tenda-AC23-SetIpMacBind-2d753a41781f8026a001f16e85226a21?source=copy_link - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.338601 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338601 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.725447 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| CPE | cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:* |
|
| First Time |
Tenda
Tenda ac23 Firmware Tenda ac23 |
30 Dec 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 03:15
Updated : 2026-01-02 21:29
NVD link : CVE-2025-15216
Mitre link : CVE-2025-15216
CVE.ORG link : CVE-2025-15216
JSON object : View
Products Affected
tenda
- ac23
- ac23_firmware
