Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ac10_firmware Vendor: tenda

About This Product

ac10_firmware is a software product offered by tenda. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 88 known vulnerabilities affecting tenda ac10_firmware. This includes 44 critical-severity issues and 28 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2025, indicating a sustained research interest and ongoing security attention. 15 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-18706 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18707 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18708 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18709 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18727 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18729 2018-10-29 2024-11-21 9.8 9.0 Likely
CVE-2018-18730 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18731 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18732 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-14558 2018-10-30 2025-11-07 9.8 10.0 Likely
CVE-2018-14557 2019-04-25 2024-11-21 7.5 7.8 Likely
CVE-2018-14559 2019-04-25 2024-11-21 7.5 7.8 Likely
CVE-2022-32054 2022-07-07 2024-11-21 9.8 10.0 Likely
CVE-2022-42163 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42164 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42165 2022-10-17 2025-05-13 9.8 - -
CVE-2022-42166 2022-10-17 2025-05-13 9.8 - -
CVE-2022-42167 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42168 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42169 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42170 2022-10-17 2025-05-15 9.8 - -
CVE-2022-42171 2022-10-17 2025-05-15 9.8 - -
CVE-2022-46109 2022-12-16 2025-04-17 7.5 - -
CVE-2023-27012 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27013 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27014 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27015 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27016 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27017 2023-04-07 2024-11-21 9.8 - -
CVE-2023-27018 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27019 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27020 2023-04-07 2025-02-12 9.8 - -
CVE-2023-27021 2023-04-07 2025-02-12 9.8 - -
CVE-2023-34566 2023-06-08 2025-01-06 9.8 - -
CVE-2023-34567 2023-06-08 2025-01-06 6.7 - -
CVE-2023-34568 2023-06-08 2025-01-06 6.7 - -
CVE-2023-34569 2023-06-08 2025-01-06 6.7 - -
CVE-2023-34570 2023-06-08 2025-01-06 6.7 - -
CVE-2023-34571 2023-06-08 2025-01-06 6.7 - -
CVE-2023-37710 2023-07-10 2024-11-21 9.8 - -
CVE-2023-37711 2023-07-10 2024-11-21 9.8 - -
CVE-2023-37716 2023-07-14 2024-11-21 9.8 - -
CVE-2023-37717 2023-07-14 2024-11-21 9.8 - -
CVE-2023-38931 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38933 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38935 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38936 2023-08-07 2024-11-21 9.8 - -
CVE-2023-38937 2023-08-07 2024-11-21 9.8 - -
CVE-2023-42320 2023-09-18 2024-11-21 9.8 - -
CVE-2023-45479 2023-11-29 2024-11-21 9.8 - -
CVE-2023-45480 2023-11-29 2024-11-21 9.8 - -
CVE-2023-45481 2023-11-29 2025-06-05 9.8 - -
CVE-2023-45482 2023-11-29 2024-11-21 9.8 - -
CVE-2023-45483 2023-11-29 2024-11-21 9.8 - -
CVE-2023-45484 2023-11-29 2024-11-21 9.8 - -
CVE-2024-25373 2024-02-15 2025-03-17 4.6 - -
CVE-2024-2581 2024-03-18 2025-01-22 8.8 9.0 Likely
CVE-2024-2856 2024-03-24 2024-11-21 8.8 9.0 Likely
CVE-2024-32317 2024-04-17 2025-03-17 7.5 - -
CVE-2024-33365 2024-07-29 2025-07-07 7.5 - -
CVE-2024-10280 2024-10-23 2024-11-01 6.5 6.8 Likely
CVE-2024-11056 2024-11-10 2024-11-14 8.8 9.0 Likely
CVE-2024-11061 2024-11-11 2024-11-13 8.8 9.0 Likely
CVE-2024-11248 2024-11-15 2024-11-19 8.8 9.0 Likely
CVE-2025-0528 2025-01-17 2025-05-28 7.2 8.3 Unknown
CVE-2025-25674 2025-02-20 2025-03-17 9.8 - -
CVE-2025-25675 2025-02-20 2025-03-17 9.8 - -
CVE-2025-3161 2025-04-03 2025-04-09 8.8 9.0 Likely
CVE-2025-25456 2025-04-15 2025-04-22 9.8 - -
CVE-2025-25453 2025-04-15 2025-04-22 4.6 - -
CVE-2025-25458 2025-04-15 2025-04-22 4.6 - -
CVE-2025-25457 2025-04-17 2025-04-22 7.5 - -
CVE-2025-25454 2025-04-17 2025-04-22 7.5 - -
CVE-2025-25455 2025-04-17 2025-04-22 7.5 - -
CVE-2025-45779 2025-05-12 2025-06-13 9.8 - -
CVE-2025-44175 2025-05-12 2025-06-13 5.4 - -
CVE-2025-4896 2025-05-18 2025-05-27 8.8 9.0 Likely
CVE-2025-5629 2025-06-05 2025-06-06 8.8 9.0 Likely
CVE-2025-8178 2025-07-26 2025-08-01 8.8 9.0 Likely
CVE-2025-9309 2025-08-21 2025-08-25 2.5 1.0 Unknown
CVE-2025-57217 2025-08-28 2025-09-03 5.3 - -
CVE-2025-57218 2025-08-28 2025-09-03 5.3 - -
CVE-2025-57215 2025-08-28 2025-09-03 7.5 - -
CVE-2025-57219 2025-08-28 2025-09-03 5.3 - -
CVE-2025-57220 2025-08-28 2025-09-03 5.3 - -
CVE-2025-12622 2025-11-03 2025-11-05 8.8 9.0 Likely
CVE-2025-67073 2025-12-17 2026-01-02 9.8 - -
CVE-2025-67074 2025-12-17 2026-01-02 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for tenda ac10_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.