CVE-2025-65221

4.3 MEDIUM

📋 TL;DR

Tenda AC21 router firmware version V16.03.08.16 contains a buffer overflow vulnerability in the setPptpUserList function. Attackers can exploit this by sending specially crafted requests to the /goform/setPptpUserList endpoint, potentially causing denial of service or remote code execution. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Tenda AC21
Versions: V16.03.08.16
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; requires access to router's web management interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, and network infiltration

🟠

Likely Case

Router crash/reboot causing denial of service and network disruption

🟢

If Mitigated

Limited impact if network segmentation isolates router management interface

🌐 Internet-Facing: MEDIUM - Requires access to router's web interface which may be exposed
🏢 Internal Only: MEDIUM - Attackers on local network can exploit if they reach management interface

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to router's web interface; buffer overflow in list parameter is straightforward to trigger

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for AC21
3. Log into router admin panel
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router's web interface

Change default credentials

all

Use strong, unique admin password to reduce attack surface

🧯 If You Can't Patch

  • Segment router management interface to isolated VLAN
  • Implement network firewall rules to restrict access to router's web interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin panel under System Status

Check Version:

Login to router web interface and check System Status page

Verify Fix Applied:

Verify firmware version is newer than V16.03.08.16

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by POST requests to /goform/setPptpUserList with long list parameter

Network Indicators:

  • Unusual HTTP POST requests to router management interface with oversized parameters

SIEM Query:

source="router_logs" AND (uri="/goform/setPptpUserList" AND content_length>1000)

🔗 References

📤 Share & Export