CVE-2025-11550: NULL Pointer Dereference in Tenda W12
A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11550 is a vulnerability identified in the Tenda W12 router firmware version 3.0.0.6(3948). The root cause is a null pointer dereference triggered by manipulating the argument to the wifiScheduledSet function located in the /goform/modules path of the HTTP Request Handler component. This function processes HTTP requests related to Wi-Fi scheduling features. When an attacker sends a specially crafted HTTP request to this endpoint, the argument handling leads to a null pointer dereference, causing the router's software to crash or reboot, resulting in denial of service (DoS). The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to any attacker with network access to the device. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on availability (VA:H) with no impact on confidentiality or integrity. Although no active exploitation has been reported, a public exploit is available, increasing the risk of exploitation. The vulnerability affects the availability of the device, potentially disrupting network connectivity for users relying on the Tenda W12 router. No official patches or mitigation links have been published at the time of disclosure, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations using Tenda W12 routers, this vulnerability poses a significant risk to network availability. Exploitation can cause routers to crash or reboot, leading to temporary loss of internet connectivity and disruption of business operations dependent on stable network access. Critical infrastructure, small and medium enterprises, and home office environments relying on these devices may experience service outages. The lack of authentication requirement and remote exploitability means attackers can launch denial of service attacks from anywhere on the internet or local network. This could be leveraged in targeted attacks or as part of broader denial of service campaigns. Additionally, network downtime can impact productivity, customer service, and potentially safety in environments relying on continuous connectivity. The absence of patches increases exposure duration, necessitating proactive mitigation. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity reported.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface by disabling WAN-side HTTP access or limiting it to trusted IP addresses. 2. Implement network segmentation to isolate vulnerable Tenda W12 devices from critical network segments, reducing attack surface. 3. Monitor network traffic for unusual HTTP requests targeting /goform/modules or suspicious wifiScheduledSet parameters to detect exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to identify and block exploit attempts against this vulnerability. 5. Regularly check for firmware updates or security advisories from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed. 7. Educate network administrators about this vulnerability and ensure incident response plans include steps for denial of service events affecting network hardware. 8. Use network access control (NAC) to prevent unauthorized devices from connecting to the network, limiting attacker foothold.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11550: NULL Pointer Dereference in Tenda W12
Description
A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11550 is a vulnerability identified in the Tenda W12 router firmware version 3.0.0.6(3948). The root cause is a null pointer dereference triggered by manipulating the argument to the wifiScheduledSet function located in the /goform/modules path of the HTTP Request Handler component. This function processes HTTP requests related to Wi-Fi scheduling features. When an attacker sends a specially crafted HTTP request to this endpoint, the argument handling leads to a null pointer dereference, causing the router's software to crash or reboot, resulting in denial of service (DoS). The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to any attacker with network access to the device. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on availability (VA:H) with no impact on confidentiality or integrity. Although no active exploitation has been reported, a public exploit is available, increasing the risk of exploitation. The vulnerability affects the availability of the device, potentially disrupting network connectivity for users relying on the Tenda W12 router. No official patches or mitigation links have been published at the time of disclosure, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations using Tenda W12 routers, this vulnerability poses a significant risk to network availability. Exploitation can cause routers to crash or reboot, leading to temporary loss of internet connectivity and disruption of business operations dependent on stable network access. Critical infrastructure, small and medium enterprises, and home office environments relying on these devices may experience service outages. The lack of authentication requirement and remote exploitability means attackers can launch denial of service attacks from anywhere on the internet or local network. This could be leveraged in targeted attacks or as part of broader denial of service campaigns. Additionally, network downtime can impact productivity, customer service, and potentially safety in environments relying on continuous connectivity. The absence of patches increases exposure duration, necessitating proactive mitigation. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity reported.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface by disabling WAN-side HTTP access or limiting it to trusted IP addresses. 2. Implement network segmentation to isolate vulnerable Tenda W12 devices from critical network segments, reducing attack surface. 3. Monitor network traffic for unusual HTTP requests targeting /goform/modules or suspicious wifiScheduledSet parameters to detect exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to identify and block exploit attempts against this vulnerability. 5. Regularly check for firmware updates or security advisories from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed. 7. Educate network administrators about this vulnerability and ensure incident response plans include steps for denial of service events affecting network hardware. 8. Use network access control (NAC) to prevent unauthorized devices from connecting to the network, limiting attacker foothold.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-09T11:14:52.099Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e7fd81ba0e608b4fa96486
Added to database: 10/9/2025, 6:22:57 PM
Last enriched: 10/9/2025, 6:37:57 PM
Last updated: 10/10/2025, 7:01:55 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-21050: CWE-20: Improper Input Validation in Samsung Mobile Samsung Mobile Devices
HighCVE-2025-10124: CWE-863 Incorrect Authorization in Booking Manager
HighCVE-2025-21070: CWE-787: Out-of-bounds Write in Samsung Mobile Samsung Notes
MediumCVE-2025-21069: CWE-125: Out-of-bounds Read in Samsung Mobile Samsung Notes
MediumCVE-2025-21068: CWE-125: Out-of-bounds Read in Samsung Mobile Samsung Notes
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.