Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12211: Stack-based Buffer Overflow in Tenda O3

0
High
VulnerabilityCVE-2025-12211cvecve-2025-12211
Published: Mon Oct 27 2025 (10/27/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: O3

Description

A security flaw has been discovered in Tenda O3 1.0.0.10(2478). Affected by this issue is the function SetValue/GetValue of the file /goform/setDmzInfo. The manipulation of the argument dmzIP results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:36:31 UTC

Technical Analysis

CVE-2025-12211 is a stack-based buffer overflow vulnerability identified in the Tenda O3 router firmware version 1.0.0.10(2478). The vulnerability arises from improper handling of the dmzIP parameter in the /goform/setDmzInfo endpoint, specifically within the SetValue and GetValue functions. When an attacker sends a specially crafted request manipulating the dmzIP argument, it causes a buffer overflow on the stack, which can overwrite control data such as return addresses. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges on the device, potentially leading to full device compromise. The CVSS v4.0 score is 8.7 (high), reflecting the ease of exploitation (network vector, no authentication), and the severe impact on confidentiality, integrity, and availability. Although no active exploitation in the wild has been reported, a public exploit is available, increasing the risk of imminent attacks. The vulnerability affects a specific firmware version, and no official patch links have been published yet, indicating that mitigation options may be limited to workarounds or device replacement for now.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code on affected Tenda O3 devices, potentially leading to full device compromise. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and use of compromised devices as footholds for further attacks within organizational networks. The compromise of routers can undermine network perimeter security, enabling attackers to bypass firewalls, launch man-in-the-middle attacks, or pivot to internal systems. Given the critical role of routers in network infrastructure, exploitation could cause significant operational disruption and data breaches. Organizations relying on Tenda O3 routers, especially in enterprise, government, or critical infrastructure sectors, face elevated risks. The public availability of exploits increases the likelihood of widespread attacks, including automated scanning and exploitation campaigns.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda O3 devices running firmware version 1.0.0.10(2478) within the network. 2. Monitor vendor communications closely for official patches or firmware updates addressing CVE-2025-12211 and apply them promptly upon release. 3. Until patches are available, restrict access to the management interface and the /goform/setDmzInfo endpoint by implementing network segmentation and firewall rules limiting access to trusted IP addresses only. 4. Disable remote management features on affected devices if not strictly necessary to reduce exposure. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 6. Conduct regular network traffic analysis to identify anomalous requests to the vulnerable endpoint. 7. Consider replacing affected devices with models from vendors with timely security update support if patching is delayed. 8. Educate network administrators about the vulnerability and the importance of monitoring for exploitation attempts. 9. Implement network-level mitigations such as rate limiting and anomaly detection to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:59:09.592Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68feefec79a7bb5513b9db5f

Added to database: 10/27/2025, 4:07:08 AM

Last enriched: 2/24/2026, 9:36:31 PM

Last updated: 3/24/2026, 4:31:34 AM

Views: 173

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses