CVE-2025-11549: Stack-based Buffer Overflow in Tenda W12
A vulnerability has been found in Tenda W12 3.0.0.6(3948). The affected element is the function wifiMacFilterSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-11549 is a stack-based buffer overflow vulnerability identified in the Tenda W12 router firmware version 3.0.0.6(3948). The flaw resides in the wifiMacFilterSet function located in the /goform/modules path of the HTTP Request Handler component. Specifically, the vulnerability arises from improper validation and handling of the mac argument passed to this function, which allows an attacker to overwrite the stack memory. This type of vulnerability can lead to arbitrary code execution, denial of service, or complete device compromise. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits have been observed in the wild, the public disclosure of exploit details increases the likelihood of exploitation attempts. The affected product, Tenda W12, is a consumer and small office/home office (SOHO) Wi-Fi 6 router, commonly used for wireless networking. The vulnerability could be leveraged by attackers to gain unauthorized control over the router, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
For European organizations, the exploitation of CVE-2025-11549 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, disruption of business operations, and potential lateral movement within corporate environments. Organizations relying on Tenda W12 routers for critical connectivity may experience network outages or compromised data integrity. The vulnerability’s remote exploitability without authentication significantly raises the risk profile, especially for organizations with exposed management interfaces or insufficient network segmentation. Given the router’s role as a network gateway, successful exploitation could undermine perimeter defenses and facilitate further attacks such as malware deployment or espionage. Small and medium enterprises, as well as home office setups prevalent in Europe, may be particularly vulnerable due to limited IT security resources and delayed patching cycles.
Mitigation Recommendations
1. Immediately monitor for firmware updates or security patches released by Tenda addressing CVE-2025-11549 and apply them promptly. 2. Until patches are available, disable remote management interfaces on Tenda W12 devices to prevent external exploitation. 3. Restrict network access to router management ports using firewall rules or network segmentation to limit exposure. 4. Implement network intrusion detection/prevention systems (IDS/IPS) to identify and block suspicious HTTP requests targeting the wifiMacFilterSet function. 5. Conduct regular network traffic analysis to detect anomalous activities indicative of exploitation attempts. 6. Educate users and administrators about the risks of using outdated router firmware and enforce strict patch management policies. 7. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed or unsupported.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11549: Stack-based Buffer Overflow in Tenda W12
Description
A vulnerability has been found in Tenda W12 3.0.0.6(3948). The affected element is the function wifiMacFilterSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11549 is a stack-based buffer overflow vulnerability identified in the Tenda W12 router firmware version 3.0.0.6(3948). The flaw resides in the wifiMacFilterSet function located in the /goform/modules path of the HTTP Request Handler component. Specifically, the vulnerability arises from improper validation and handling of the mac argument passed to this function, which allows an attacker to overwrite the stack memory. This type of vulnerability can lead to arbitrary code execution, denial of service, or complete device compromise. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits have been observed in the wild, the public disclosure of exploit details increases the likelihood of exploitation attempts. The affected product, Tenda W12, is a consumer and small office/home office (SOHO) Wi-Fi 6 router, commonly used for wireless networking. The vulnerability could be leveraged by attackers to gain unauthorized control over the router, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
For European organizations, the exploitation of CVE-2025-11549 could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, disruption of business operations, and potential lateral movement within corporate environments. Organizations relying on Tenda W12 routers for critical connectivity may experience network outages or compromised data integrity. The vulnerability’s remote exploitability without authentication significantly raises the risk profile, especially for organizations with exposed management interfaces or insufficient network segmentation. Given the router’s role as a network gateway, successful exploitation could undermine perimeter defenses and facilitate further attacks such as malware deployment or espionage. Small and medium enterprises, as well as home office setups prevalent in Europe, may be particularly vulnerable due to limited IT security resources and delayed patching cycles.
Mitigation Recommendations
1. Immediately monitor for firmware updates or security patches released by Tenda addressing CVE-2025-11549 and apply them promptly. 2. Until patches are available, disable remote management interfaces on Tenda W12 devices to prevent external exploitation. 3. Restrict network access to router management ports using firewall rules or network segmentation to limit exposure. 4. Implement network intrusion detection/prevention systems (IDS/IPS) to identify and block suspicious HTTP requests targeting the wifiMacFilterSet function. 5. Conduct regular network traffic analysis to detect anomalous activities indicative of exploitation attempts. 6. Educate users and administrators about the risks of using outdated router firmware and enforce strict patch management policies. 7. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed or unsupported.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-09T11:14:49.267Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e7ebf3ba0e608b4fa3cf7e
Added to database: 10/9/2025, 5:08:03 PM
Last enriched: 10/9/2025, 5:22:54 PM
Last updated: 10/10/2025, 12:26:23 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7781: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WP JobHunt
MediumCVE-2025-7374: CWE-863 Incorrect Authorization in WP JobHunt
MediumCVE-2025-11579: CWE-789: Memory Allocation with Excessive Size Value in nwaples rardecode
MediumCVE-2025-61864: Use after free in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
HighCVE-2025-61863: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.