Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12210: Stack-based Buffer Overflow in Tenda O3

0
High
VulnerabilityCVE-2025-12210cvecve-2025-12210
Published: Mon Oct 27 2025 (10/27/2025, 03:02:13 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: O3

Description

A vulnerability was identified in Tenda O3 1.0.0.10(2478). Affected by this vulnerability is the function SetValue/GetValue of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:36:19 UTC

Technical Analysis

CVE-2025-12210 is a stack-based buffer overflow vulnerability found in the Tenda O3 device firmware version 1.0.0.10(2478). The flaw resides in the SetValue and GetValue functions within the /goform/AdvSetLanip endpoint, which processes the lanIp argument. Improper input validation allows an attacker to overflow the stack by sending a specially crafted lanIp parameter remotely, without requiring authentication or user interaction. This overflow can overwrite control data on the stack, potentially enabling arbitrary code execution or denial of service. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges or user interaction required. Publicly available exploit code increases the likelihood of exploitation, although no active exploitation has been reported yet. The vulnerability affects a specific firmware version, so devices running this version or earlier are at risk. The absence of official patches or mitigation guidance in the provided data indicates that affected organizations must implement interim controls to reduce exposure. Given the device’s role in network management, exploitation could lead to full device compromise, network disruption, or pivoting to internal networks.

Potential Impact

The impact of CVE-2025-12210 is significant for organizations using Tenda O3 devices, especially those running the vulnerable firmware version 1.0.0.10(2478). Successful exploitation can result in arbitrary code execution on the device, allowing attackers to take full control. This compromises the confidentiality of network configurations and potentially sensitive data passing through the device. Integrity is at risk as attackers could alter device settings or firmware, enabling persistent access or further attacks. Availability may be disrupted through denial-of-service conditions caused by the overflow. Since the device likely serves as a network gateway or access point, compromise could facilitate lateral movement within internal networks, exposing broader organizational assets. The remote, unauthenticated nature of the exploit increases the attack surface, making widespread automated attacks feasible once exploit code is leveraged. Organizations relying on these devices for critical network functions face increased risk of operational disruption and data breaches.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict access to the device management interface (/goform/AdvSetLanip) to trusted IP addresses only, using firewall rules or access control lists. 2. Disable remote management features if not strictly necessary to reduce exposure. 3. Monitor network traffic for unusual requests targeting the vulnerable endpoint, employing intrusion detection/prevention systems with signatures for this exploit. 4. Segregate vulnerable devices on isolated network segments to limit potential lateral movement. 5. Engage with Tenda support or vendor channels to obtain official patches or firmware updates addressing this vulnerability. 6. If patches are unavailable, consider device replacement or firmware rollback to a non-vulnerable version if feasible. 7. Conduct regular vulnerability scans and penetration tests focusing on network devices to detect exploitation attempts. 8. Maintain robust incident response plans to quickly contain and remediate any compromise involving these devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:59:06.873Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fee1ba23a7bbed324e8bc0

Added to database: 10/27/2025, 3:06:34 AM

Last enriched: 2/24/2026, 9:36:19 PM

Last updated: 3/23/2026, 2:23:50 PM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses