Skip to main content

CVE-2025-44900: n/a in n/a

Medium
VulnerabilityCVE-2025-44900cvecve-2025-44900
Published: Tue May 06 2025 (05/06/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In Tenda RX3 V1.0br_V16.03.13.11 in the GetParentControlInfo function of the web url /goform/GetParentControlInfo, the manipulation of the parameter mac leads to stack overflow.

AI-Powered Analysis

AILast updated: 07/05/2025, 16:10:15 UTC

Technical Analysis

CVE-2025-44900 is a medium severity vulnerability identified in the Tenda RX3 router firmware version V1.0br_V16.03.13.11. The vulnerability exists in the GetParentControlInfo function accessible via the web URL /goform/GetParentControlInfo. Specifically, the issue arises from improper handling of the 'mac' parameter, which can be manipulated to trigger a stack-based buffer overflow (CWE-121). This type of vulnerability occurs when data exceeding the buffer's capacity is written to the stack, potentially overwriting adjacent memory and leading to unpredictable behavior such as crashes or arbitrary code execution. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, with low attack complexity. The impact affects confidentiality and integrity but does not directly affect availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved on 2025-04-22 and published on 2025-05-06. The lack of vendor or product details beyond the Tenda RX3 firmware version limits the scope of affected devices, but given the nature of consumer routers, this vulnerability could be leveraged by attackers to gain unauthorized access or manipulate router configurations if exploited successfully.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized disclosure of sensitive network information and potential manipulation of router settings, undermining network security and privacy. Since routers like the Tenda RX3 are often used in small offices and home environments, compromised devices could serve as entry points for lateral movement into corporate networks, especially in remote work scenarios. The confidentiality and integrity impacts could result in interception or alteration of network traffic, potentially exposing corporate credentials or sensitive communications. Although availability impact is not indicated, the exploitation could facilitate further attacks such as man-in-the-middle or persistent backdoors. The absence of authentication requirements and user interaction increases the risk, particularly for organizations with less stringent network perimeter defenses or those using these routers in critical network segments.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda RX3 routers running the vulnerable firmware version V1.0br_V16.03.13.11. Until an official patch is released, network administrators should restrict access to the router management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. Disabling remote management features and changing default credentials can reduce exposure. Monitoring network traffic for unusual requests to the /goform/GetParentControlInfo endpoint and anomalous MAC parameter values can help detect exploitation attempts. Employing intrusion detection/prevention systems with custom signatures targeting this URL and parameter manipulation is advisable. Additionally, organizations should engage with Tenda support channels to obtain firmware updates or mitigation guidance and plan for timely patch deployment once available. For critical environments, consider replacing vulnerable devices with models from vendors with robust security update policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9dce

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 4:10:15 PM

Last updated: 7/25/2025, 11:08:29 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats