Skip to main content

CVE-2025-4007: Stack-based Buffer Overflow in Tenda W12

High
VulnerabilityCVE-2025-4007cvecve-2025-4007
Published: Mon Apr 28 2025 (04/28/2025, 07:31:05 UTC)
Source: CVE
Vendor/Project: Tenda
Product: W12

Description

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:36:18 UTC

Technical Analysis

CVE-2025-4007 is a critical stack-based buffer overflow vulnerability identified in the Tenda W12 router and i24 firmware versions 3.0.0.4(2887) and 3.0.0.5(3644). The flaw exists in the httpd component, specifically within the cgidhcpsCfgSet function located in the /goform/modules directory. This function processes a JSON argument, which, when manipulated maliciously, triggers a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite memory on the stack, potentially leading to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation (attack vector: network), low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated as high, indicating that successful exploitation could lead to full system compromise. Although no public exploits are currently known to be in the wild, the exploit details have been publicly disclosed, which raises the risk of imminent exploitation attempts. The vulnerability affects specific firmware versions, indicating that devices running these versions are at risk until patched or mitigated.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Tenda W12 routers in their network infrastructure. Successful exploitation could allow attackers to gain unauthorized remote control over affected devices, leading to potential data breaches, network disruption, or pivoting to other internal systems. This is particularly critical for enterprises, small and medium businesses, and public sector entities that may use these routers for internet connectivity or internal network segmentation. The compromise of such devices could result in loss of confidentiality of sensitive data, integrity violations through unauthorized configuration changes, and availability issues due to device crashes or reboots. Additionally, since the vulnerability requires no authentication or user interaction, automated scanning and exploitation campaigns could rapidly affect unpatched devices across Europe, amplifying the threat. The public disclosure of the exploit increases the urgency for mitigation to prevent widespread attacks.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should verify the firmware version of their Tenda W12 and i24 devices and upgrade to a version that addresses this vulnerability as soon as a patch is released by the vendor. 2. Network segmentation: Isolate vulnerable devices from critical network segments to limit potential lateral movement if exploitation occurs. 3. Access control: Restrict remote management access to the affected devices by limiting access to trusted IP addresses and disabling remote HTTP management interfaces if not required. 4. Intrusion detection: Deploy network-based intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the /goform/modules endpoint or unusual JSON payloads. 5. Monitoring and logging: Enable detailed logging on routers and monitor for anomalous activities, such as unexpected configuration changes or traffic patterns indicative of exploitation attempts. 6. Vendor engagement: Engage with Tenda support channels to obtain official patches or workarounds and confirm the timeline for remediation. 7. Temporary mitigations: If patches are unavailable, consider disabling or restricting the vulnerable httpd service or applying firewall rules to block suspicious traffic targeting the vulnerable endpoint. These steps go beyond generic advice by focusing on device-specific controls and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T09:18:43.117Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef6ea

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 7:36:18 PM

Last updated: 8/6/2025, 1:44:42 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats