Skip to main content

CVE-2025-5527: Stack-based Buffer Overflow in Tenda RX3

High
VulnerabilityCVE-2025-5527cvecve-2025-5527
Published: Tue Jun 03 2025 (06/03/2025, 20:31:06 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: RX3

Description

A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01. It has been rated as critical. This issue affects the function save_staticroute_data of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 05:48:21 UTC

Technical Analysis

CVE-2025-5527 is a critical stack-based buffer overflow vulnerability identified in the Tenda RX3 router firmware version 16.03.13.11_multi_TDE01. The flaw exists in the function save_staticroute_data within the /goform/SetStaticRouteCfg endpoint. This function improperly handles input arguments, allowing an attacker to manipulate the argument list and trigger a stack-based buffer overflow. Because the vulnerability is remotely exploitable without authentication or user interaction, an attacker can send specially crafted requests to the affected router to execute arbitrary code or cause denial of service. The vulnerability has a CVSS 4.0 base score of 8.7 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability affects a specific firmware version of the Tenda RX3 router, a consumer and small business networking device commonly used for internet connectivity. The flaw could allow attackers to gain control over the router, intercept or manipulate network traffic, disrupt network availability, or pivot into internal networks, posing significant security risks.

Potential Impact

For European organizations, exploitation of CVE-2025-5527 could lead to severe operational and security consequences. Compromised routers could enable attackers to intercept sensitive communications, exfiltrate confidential data, or inject malicious traffic, undermining data confidentiality and integrity. The ability to execute arbitrary code remotely without authentication means attackers could establish persistent footholds within organizational networks, facilitating further lateral movement and advanced persistent threats. Disruption of network availability could impact business continuity, especially for organizations relying on Tenda RX3 routers for critical connectivity. Small and medium enterprises, which often use consumer-grade routers like the Tenda RX3, are particularly at risk. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, amplifying threats to European internet infrastructure and services.

Mitigation Recommendations

Organizations should immediately identify any Tenda RX3 devices running firmware version 16.03.13.11_multi_TDE01 and prioritize their remediation. Since no official patches are currently linked, users should monitor Tenda’s official channels for firmware updates addressing this vulnerability and apply them promptly once available. In the interim, network administrators should restrict access to router management interfaces, especially the /goform/SetStaticRouteCfg endpoint, by implementing network segmentation and firewall rules to limit exposure to untrusted networks. Disabling remote management features or restricting them to trusted IP addresses can reduce attack surface. Employing intrusion detection and prevention systems (IDS/IPS) with signatures for buffer overflow attempts targeting Tenda routers can help detect exploitation attempts. Regularly auditing router configurations and monitoring network traffic for anomalies is recommended. Organizations should also consider replacing vulnerable devices with models that have a stronger security track record if timely patches are unavailable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T13:11:39.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683f5e63182aa0cae28c1a36

Added to database: 6/3/2025, 8:43:15 PM

Last enriched: 7/11/2025, 5:48:21 AM

Last updated: 8/2/2025, 12:55:23 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats