CVE-2025-30256: CWE-772: Missing Release of Resource after Effective Lifetime in Tenda AC6 V5.0
A denial of service vulnerability exists in the HTTP Header Parsing functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted series of HTTP requests can lead to a reboot. An attacker can send multiple network packets to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2025-30256 is a high-severity denial of service (DoS) vulnerability affecting the Tenda AC6 V5.0 router, specifically version V02.03.01.110. The vulnerability arises from improper resource management in the HTTP header parsing functionality, classified under CWE-772 (Missing Release of Resource after Effective Lifetime). An attacker can exploit this flaw by sending a specially crafted sequence of HTTP requests to the device, causing it to exhaust resources and subsequently reboot. This reboot disrupts normal network operations and can lead to temporary loss of connectivity for all devices relying on the affected router. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 8.6 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and low attack complexity (AC:L). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the entire device. No known exploits are currently reported in the wild, and no patches have been published yet, which means affected users remain vulnerable. The root cause is the failure to release resources after their effective lifetime during HTTP header parsing, leading to resource exhaustion and forced device reboot.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, especially for small and medium enterprises or home office environments that rely on Tenda AC6 V5.0 routers. A successful attack can cause repeated router reboots, resulting in intermittent or prolonged internet outages, disrupting business operations, VoIP communications, and access to cloud services. Critical infrastructure or organizations with remote workforces using these routers may experience productivity losses and potential secondary impacts due to network instability. Although the vulnerability does not directly compromise confidentiality or integrity, the denial of service can be leveraged as part of a broader attack strategy, such as timed disruptions during critical operations or combined with other attacks to increase impact. The lack of authentication and user interaction requirements means attackers can launch attacks remotely and anonymously, increasing the threat surface. Given the router’s typical deployment in consumer and small business environments, the impact on large enterprises may be limited unless these devices are used in branch offices or remote sites.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections and device configuration adjustments. Organizations should implement network segmentation to isolate vulnerable routers from critical infrastructure and restrict inbound HTTP traffic to management interfaces from untrusted networks. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for unusual HTTP request patterns can help detect and block exploitation attempts. Network administrators should monitor router logs for signs of repeated reboots or abnormal HTTP traffic. Since no official patch is available yet, consider temporarily replacing or upgrading affected devices to newer models or firmware versions once released. Vendors and users should prioritize firmware updates as soon as patches become available. Additionally, disabling remote management over HTTP or restricting it to trusted IP addresses reduces exposure. For environments where replacement is not immediately feasible, implementing rate limiting on HTTP requests to the router can mitigate resource exhaustion attempts. Regular backups of router configurations and network documentation will aid in rapid recovery if devices are compromised or need replacement.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-30256: CWE-772: Missing Release of Resource after Effective Lifetime in Tenda AC6 V5.0
Description
A denial of service vulnerability exists in the HTTP Header Parsing functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted series of HTTP requests can lead to a reboot. An attacker can send multiple network packets to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-30256 is a high-severity denial of service (DoS) vulnerability affecting the Tenda AC6 V5.0 router, specifically version V02.03.01.110. The vulnerability arises from improper resource management in the HTTP header parsing functionality, classified under CWE-772 (Missing Release of Resource after Effective Lifetime). An attacker can exploit this flaw by sending a specially crafted sequence of HTTP requests to the device, causing it to exhaust resources and subsequently reboot. This reboot disrupts normal network operations and can lead to temporary loss of connectivity for all devices relying on the affected router. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 8.6 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and low attack complexity (AC:L). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the entire device. No known exploits are currently reported in the wild, and no patches have been published yet, which means affected users remain vulnerable. The root cause is the failure to release resources after their effective lifetime during HTTP header parsing, leading to resource exhaustion and forced device reboot.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, especially for small and medium enterprises or home office environments that rely on Tenda AC6 V5.0 routers. A successful attack can cause repeated router reboots, resulting in intermittent or prolonged internet outages, disrupting business operations, VoIP communications, and access to cloud services. Critical infrastructure or organizations with remote workforces using these routers may experience productivity losses and potential secondary impacts due to network instability. Although the vulnerability does not directly compromise confidentiality or integrity, the denial of service can be leveraged as part of a broader attack strategy, such as timed disruptions during critical operations or combined with other attacks to increase impact. The lack of authentication and user interaction requirements means attackers can launch attacks remotely and anonymously, increasing the threat surface. Given the router’s typical deployment in consumer and small business environments, the impact on large enterprises may be limited unless these devices are used in branch offices or remote sites.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections and device configuration adjustments. Organizations should implement network segmentation to isolate vulnerable routers from critical infrastructure and restrict inbound HTTP traffic to management interfaces from untrusted networks. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for unusual HTTP request patterns can help detect and block exploitation attempts. Network administrators should monitor router logs for signs of repeated reboots or abnormal HTTP traffic. Since no official patch is available yet, consider temporarily replacing or upgrading affected devices to newer models or firmware versions once released. Vendors and users should prioritize firmware updates as soon as patches become available. Additionally, disabling remote management over HTTP or restricting it to trusted IP addresses reduces exposure. For environments where replacement is not immediately feasible, implementing rate limiting on HTTP requests to the router can mitigate resource exhaustion attempts. Regular backups of router configurations and network documentation will aid in rapid recovery if devices are compromised or need replacement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2025-03-31T11:59:44.601Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a5caffad5a09ad0004fc73
Added to database: 8/20/2025, 1:17:51 PM
Last enriched: 8/20/2025, 1:33:11 PM
Last updated: 8/21/2025, 12:35:14 AM
Views: 4
Related Threats
CVE-2025-9296: Unrestricted Upload in Emlog Pro
MediumCVE-2025-8064: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in aicwebtech Bible SuperSearch
MediumCVE-2025-8895: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cozmoslabs WP Webhooks – Automate repetitive tasks by creating powerful automation workflows directly within WordPress
CriticalCVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
CriticalCVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.