Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ac15_firmware Vendor: tenda

About This Product

ac15_firmware is a software product offered by tenda. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 79 known vulnerabilities affecting tenda ac15_firmware. This includes 22 critical-severity issues and 44 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2025, indicating a sustained research interest and ongoing security attention. 13 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-16923 2017-11-21 2025-04-20 8.8 8.3 Unknown
CVE-2017-16936 2017-11-24 2025-04-20 6.5 3.3 Unknown
CVE-2018-18706 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18707 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18708 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18709 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18727 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18728 2018-10-29 2024-11-21 9.8 7.5 Likely
CVE-2018-18729 2018-10-29 2024-11-21 9.8 9.0 Likely
CVE-2018-18730 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18731 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2018-18732 2018-10-29 2024-11-21 7.5 7.8 Likely
CVE-2020-10986 2020-07-13 2024-11-21 6.5 7.1 Likely
CVE-2020-10987 2020-07-13 2025-11-07 9.8 10.0 Likely
CVE-2020-10988 2020-07-13 2024-11-21 9.8 10.0 Likely
CVE-2020-10989 2020-07-13 2024-11-21 6.1 4.3 Likely
CVE-2020-15916 2020-07-23 2024-11-21 9.8 10.0 Likely
CVE-2021-44971 2022-01-28 2024-11-21 9.8 7.5 Likely
CVE-2022-28556 2022-05-04 2024-11-21 7.5 5.0 Likely
CVE-2022-28557 2022-05-04 2024-11-21 9.8 7.5 Likely
CVE-2022-37175 2022-08-19 2024-11-21 9.8 - -
CVE-2022-40851 2022-09-23 2025-05-22 9.8 - -
CVE-2022-43259 2022-10-18 2025-05-12 7.5 - -
CVE-2022-44167 2022-11-21 2025-04-29 7.5 - -
CVE-2022-44168 2022-11-21 2025-04-29 7.5 - -
CVE-2022-44169 2022-11-21 2025-04-29 7.5 - -
CVE-2022-44156 2022-11-21 2025-04-29 7.5 - -
CVE-2023-30369 2023-04-24 2025-02-04 9.8 - -
CVE-2023-30370 2023-04-24 2025-02-04 9.8 - -
CVE-2023-30371 2023-04-24 2025-02-04 9.8 - -
CVE-2023-30372 2023-04-24 2025-02-04 9.8 - -
CVE-2023-30373 2023-04-24 2025-02-04 9.8 - -
CVE-2023-30375 2023-04-24 2025-02-05 9.8 - -
CVE-2023-30376 2023-04-24 2025-02-05 9.8 - -
CVE-2023-30378 2023-04-24 2025-02-05 9.8 - -
CVE-2023-39673 2023-08-18 2024-11-21 9.8 - -
CVE-2024-2805 2024-03-22 2025-01-24 8.8 9.0 Likely
CVE-2024-2806 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2807 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2808 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2809 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2810 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2811 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2812 2024-03-22 2024-11-21 6.3 6.5 Likely
CVE-2024-2813 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2814 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2815 2024-03-22 2024-11-21 8.8 9.0 Likely
CVE-2024-2816 2024-03-22 2024-11-21 4.3 5.0 Likely
CVE-2024-2817 2024-03-22 2024-11-21 4.3 5.0 Likely
CVE-2024-2850 2024-03-24 2024-11-21 8.8 9.0 Likely
CVE-2024-2851 2024-03-24 2024-11-21 6.3 6.5 Likely
CVE-2024-2852 2024-03-24 2024-11-21 8.8 9.0 Likely
CVE-2024-2855 2024-03-24 2024-11-21 8.8 9.0 Likely
CVE-2024-30613 2024-03-29 2025-04-08 4.3 - -
CVE-2024-30645 2024-03-29 2025-04-08 8.0 - -
CVE-2024-30840 2024-04-15 2025-04-14 6.5 - -
CVE-2024-32303 2024-04-17 2025-06-30 8.0 - -
CVE-2023-36103 2024-09-10 2024-09-24 9.8 - -
CVE-2024-10280 2024-10-23 2024-11-01 6.5 6.8 Likely
CVE-2024-10661 2024-11-01 2024-11-05 8.8 9.0 Likely
CVE-2024-10662 2024-11-01 2024-11-05 8.8 9.0 Likely
CVE-2025-0566 2025-01-19 2025-07-01 8.8 9.0 Likely
CVE-2025-25632 2025-03-05 2025-04-09 9.8 - -
CVE-2025-25634 2025-03-05 2025-04-10 6.5 - -
CVE-2025-29462 2025-04-03 2025-04-22 9.8 - -
CVE-2025-3786 2025-04-18 2025-04-22 8.8 9.0 Likely
CVE-2025-5848 2025-06-08 2025-06-09 8.8 9.0 Likely
CVE-2025-5849 2025-06-08 2025-06-09 8.8 9.0 Likely
CVE-2025-5850 2025-06-08 2025-06-09 8.8 9.0 Likely
CVE-2025-5851 2025-06-09 2025-06-09 8.8 9.0 Likely
CVE-2025-8979 2025-08-14 2025-08-18 6.6 6.8 Unknown
CVE-2025-55564 2025-08-21 2025-09-03 7.5 - -
CVE-2025-10442 2025-09-15 2025-09-19 6.3 6.5 Likely
CVE-2025-10443 2025-09-15 2025-09-19 8.8 9.0 Likely
CVE-2025-11386 2025-10-07 2025-10-09 8.8 9.0 Likely
CVE-2025-11387 2025-10-07 2025-10-09 8.8 9.0 Likely
CVE-2025-11388 2025-10-07 2025-10-09 8.8 9.0 Likely
CVE-2025-11389 2025-10-07 2026-02-24 8.8 9.0 Likely
CVE-2025-63666 2025-11-12 2025-11-17 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for tenda ac15_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.