Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12212: Stack-based Buffer Overflow in Tenda O3

0
High
VulnerabilityCVE-2025-12212cvecve-2025-12212
Published: Mon Oct 27 2025 (10/27/2025, 03:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: O3

Description

A weakness has been identified in Tenda O3 1.0.0.10(2478). This affects the function SetValue/GetValue of the file /goform/setNetworkService. This manipulation of the argument upnpEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/27/2025, 04:07:35 UTC

Technical Analysis

CVE-2025-12212 identifies a critical stack-based buffer overflow vulnerability in the Tenda O3 device firmware version 1.0.0.10(2478). The flaw resides in the handling of the upnpEn parameter within the /goform/setNetworkService endpoint, specifically in the SetValue and GetValue functions. By sending a specially crafted request that manipulates this argument, an attacker can overflow the stack buffer, potentially overwriting return addresses or control data. This can lead to arbitrary code execution with elevated privileges on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no prerequisites. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of future attacks. The vulnerability affects a widely deployed consumer and small office/home office (SOHO) networking device, which often serves as a gateway to internal networks, amplifying the potential impact of compromise. The lack of an official patch link suggests that vendors or users must urgently seek firmware updates or apply workarounds to mitigate risk.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full compromise of Tenda O3 devices, resulting in unauthorized access to internal networks, interception or manipulation of network traffic, and potential lateral movement within corporate environments. The buffer overflow could cause device crashes or persistent denial of service, disrupting critical network connectivity. Given the common use of Tenda devices in small and medium enterprises and residential settings, attackers could leverage this vulnerability to establish footholds for espionage, data exfiltration, or launching further attacks. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in countries with high adoption of Tenda networking equipment. This could impact sectors reliant on stable internet connectivity, including remote workforces, critical infrastructure, and service providers. Additionally, compromised devices could be conscripted into botnets, amplifying threats to broader European network stability.

Mitigation Recommendations

Organizations should immediately inventory their network to identify Tenda O3 devices running firmware version 1.0.0.10(2478). In the absence of an official patch, users should restrict access to the device management interface by implementing network segmentation and firewall rules to limit exposure to untrusted networks. Disabling UPnP services or the vulnerable /goform/setNetworkService endpoint, if configurable, can reduce attack surface. Monitoring network traffic for anomalous requests targeting this endpoint is advised. Vendors and users should prioritize firmware updates once available and consider replacing vulnerable devices if no timely patch is provided. Employing intrusion detection systems with signatures for this exploit can help detect attempted attacks. Additionally, educating users about the risks of exposing device management interfaces to the internet and enforcing strong network access controls will mitigate exploitation risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:59:12.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68feefec79a7bb5513b9db66

Added to database: 10/27/2025, 4:07:08 AM

Last enriched: 10/27/2025, 4:07:35 AM

Last updated: 10/27/2025, 6:08:51 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats