{"id":"CVE-2025-13258","details":"A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impacted element is an unknown function of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.","modified":"2026-03-14T12:41:27.941367Z","published":"2025-11-17T03:15:55.607Z","references":[{"type":"WEB","url":"https://www.tenda.com.cn/"},{"type":"ADVISORY","url":"https://vuldb.com/?id.332593"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.688716"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.332593"},{"type":"EVIDENCE","url":"https://github.com/DavCloudz/cve/blob/main/Tenda/Tengda%20AC20%20Router%20WifiExtraSet%20Buffer%20Overflow%20Vulnerability.md"},{"type":"EVIDENCE","url":"https://github.com/DavCloudz/cve/blob/main/Tenda/Tengda%20AC20%20Router%20WifiExtraSet%20Buffer%20Overflow%20Vulnerability.md#poc"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13258.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.03.08.12"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}