Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12214: Stack-based Buffer Overflow in Tenda O3

0
High
VulnerabilityCVE-2025-12214cvecve-2025-12214
Published: Mon Oct 27 2025 (10/27/2025, 04:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: O3

Description

A vulnerability was detected in Tenda O3 1.0.0.10(2478). This issue affects the function SetValue/GetValue of the file /goform/sysAutoReboot. Performing manipulation of the argument enable results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 04:30:16 UTC

Technical Analysis

CVE-2025-12214 is a stack-based buffer overflow vulnerability identified in Tenda O3 firmware version 1.0.0.10(2478). The vulnerability resides in the handling of the 'enable' argument within the SetValue and GetValue functions of the /goform/sysAutoReboot endpoint. Due to improper bounds checking, an attacker can craft malicious input to overflow the stack buffer, potentially overwriting the return address or other control data. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could allow arbitrary code execution with the privileges of the affected service, leading to full compromise of the device. The vulnerability has a CVSS 4.0 score of 8.7, reflecting high impact on confidentiality, integrity, and availability. Although no official patches have been released, a public exploit is available, increasing the urgency for mitigation. The vulnerability affects a widely deployed networking device used in small to medium enterprise and possibly consumer environments, making it a significant threat vector for network infrastructure compromise.

Potential Impact

For European organizations, this vulnerability poses a severe risk to network security and operational continuity. Compromise of Tenda O3 devices could lead to unauthorized network access, interception or manipulation of sensitive data, and disruption of network services. Given the device's role in routing or wireless connectivity, attackers could pivot into internal networks, escalating attacks to critical systems. The availability of a public exploit increases the likelihood of widespread attacks, including ransomware or espionage campaigns targeting European businesses and government entities. The lack of authentication and user interaction requirements lowers the barrier for exploitation, potentially affecting a broad range of organizations. Disruption or compromise of network infrastructure could impact sectors such as finance, healthcare, manufacturing, and public administration, which rely heavily on stable and secure connectivity.

Mitigation Recommendations

1. Immediately identify and inventory all Tenda O3 devices running version 1.0.0.10(2478) within the network. 2. Isolate vulnerable devices by segmenting them into restricted network zones to limit exposure. 3. Disable or restrict access to the /goform/sysAutoReboot endpoint if possible, using firewall rules or device configuration. 4. Monitor network traffic for unusual requests targeting the /goform/sysAutoReboot path or anomalous behavior indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or exploit. 6. Engage with Tenda support or vendor channels to obtain patches or firmware updates as soon as they become available. 7. Consider replacing vulnerable devices with alternative hardware if patching is delayed. 8. Educate network administrators about the vulnerability and ensure incident response plans include steps for this threat. 9. Regularly review device configurations to minimize unnecessary services and exposure. 10. Implement strong network access controls and logging to detect and respond to exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:59:17.863Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fef1ce79a7bb5513bbd8e0

Added to database: 10/27/2025, 4:15:10 AM

Last enriched: 10/27/2025, 4:30:16 AM

Last updated: 10/27/2025, 8:00:38 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats