Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57059: n/a

0
High
VulnerabilityCVE-2025-57059cvecve-2025-57059
Published: Tue Sep 09 2025 (09/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the dhcpIndex parameter in the addDhcpRule function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:07:45 UTC

Technical Analysis

CVE-2025-57059 is a high-severity vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The issue is a stack-based buffer overflow located in the handling of the dhcpIndex parameter within the addDhcpRule function. This function is responsible for managing DHCP rules on the device. An attacker can exploit this vulnerability by sending a specially crafted request with a malicious dhcpIndex value, causing the router's stack to overflow. This overflow leads to a Denial of Service (DoS) condition, effectively crashing or rebooting the device and disrupting network connectivity. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N), making it relatively easy to trigger. The CVSS v3.1 base score is 7.5, indicating a high severity primarily due to the impact on availability (A:H) with no impact on confidentiality or integrity. The vulnerability is categorized under CWE-121, which corresponds to stack-based buffer overflows, a common and dangerous class of memory corruption bugs. No known exploits are currently reported in the wild, and no patches have been published yet. The lack of affected version details beyond the specified firmware version suggests the issue may be limited to this firmware iteration, but users of this version are at risk. Given the nature of the vulnerability, attackers could disrupt business operations by causing network outages, especially in environments relying on these routers for critical connectivity.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, particularly for small to medium enterprises and home office setups that use Tenda G3 routers. A successful DoS attack would result in loss of internet connectivity, disrupting business communications, cloud services access, and potentially halting operations dependent on continuous network availability. Critical infrastructure or service providers using these devices as part of their network edge could face operational downtime, leading to financial losses and reputational damage. Additionally, the ease of exploitation without authentication raises the risk of automated attacks or widespread scanning campaigns targeting vulnerable devices. Although the vulnerability does not allow data theft or system compromise beyond DoS, the disruption of network services can have cascading effects on business continuity and incident response capabilities.

Mitigation Recommendations

Organizations should immediately identify any Tenda G3 routers running firmware version 3.0br_V15.11.0.17 within their networks. Until an official patch is released, mitigation should focus on network-level protections: 1) Restrict access to router management interfaces by implementing firewall rules that limit incoming traffic to trusted IP addresses only. 2) Disable remote management features if not required to reduce exposure. 3) Monitor network traffic for unusual DHCP-related requests that could indicate exploitation attempts. 4) Consider segmenting networks to isolate vulnerable devices from critical systems. 5) Engage with Tenda support channels to obtain information on forthcoming patches or firmware updates addressing this vulnerability. 6) Plan for rapid deployment of firmware updates once available. 7) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting DHCP-related anomalies to detect and block exploit attempts. These steps go beyond generic advice by focusing on immediate containment and detection strategies tailored to the specific vulnerability vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c0983d9ed239a66bacc129

Added to database: 9/9/2025, 9:12:29 PM

Last enriched: 9/17/2025, 1:07:45 AM

Last updated: 10/30/2025, 4:05:07 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats