{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15215","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-28T13:20:24.218Z","datePublished":"2025-12-30T02:02:08.414Z","dateUpdated":"2026-02-24T06:13:19.930Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:13:19.930Z"},"title":"Tenda AC10U HTTP POST Request setPptpUserList formSetPPTPUserList buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"Tenda","product":"AC10U","versions":[{"version":"15.03.06.48","status":"affected"},{"version":"15.03.06.49","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ac10u_firmware:*:*:*:*:*:*:*:*"],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Tenda AC10U 15.03.06.48/15.03.06.49. This affects the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. This manipulation of the argument list causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-03T14:53:51.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yhryhryhr_miemie (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338600","name":"VDB-338600 | Tenda AC10U HTTP POST Request setPptpUserList formSetPPTPUserList buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338600","name":"VDB-338600 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725365","name":"Submit #725365 | Tenda AC10U AC10U v1.0 Firmware  V15.03.06.48、AC10U v1.0 Firmware  V15.03.06.49 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://www.notion.so/Tenda-AC10U-setPptpUserList-2d753a41781f80e8ba6bc37ba6100343?pvs=73","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-30T18:46:07.805035Z","id":"CVE-2025-15215","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-30T18:46:13.307Z"}}]}}