CVE-2025-57070: n/a
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the gstUp parameter in the guestWifiRuleRefresh function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-57070 is a high-severity vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw is a stack-based buffer overflow occurring in the gstUp parameter within the guestWifiRuleRefresh function. This vulnerability arises when the router processes a specially crafted request that manipulates the gstUp parameter, leading to a stack overflow condition. Such a condition can overwrite critical memory regions, destabilizing the device's operation and causing a Denial of Service (DoS). The vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network (AV:N, PR:N, UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) but no direct impact on confidentiality or integrity. The underlying weakness corresponds to CWE-121, a classic stack-based buffer overflow, which is a well-known and dangerous class of vulnerabilities. No patches or known exploits in the wild have been reported yet. The vulnerability affects the Tenda G3 router, a consumer and small office networking device, which is commonly used to provide Wi-Fi connectivity including guest network functionality. The guestWifiRuleRefresh function likely manages guest Wi-Fi access rules, and the gstUp parameter is presumably part of the input controlling these rules. Exploiting this flaw can cause the router to crash or reboot, disrupting network availability for users relying on the device.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home offices that use Tenda G3 routers, this vulnerability poses a significant risk to network availability. A successful exploit can cause network outages by crashing the router, leading to loss of internet connectivity and disruption of business operations. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting DoS can impact productivity and availability of critical services. In environments where guest Wi-Fi access is used to segregate visitor traffic, this vulnerability could be leveraged to disrupt network segmentation policies, potentially increasing exposure to other threats. Additionally, if attackers use this DoS as a distraction, it could facilitate other attacks during the downtime. Given the ease of exploitation (no authentication or user interaction required), attackers can remotely target vulnerable routers, including those exposed to the internet or accessible from local networks. This is particularly concerning for organizations with limited IT security management or outdated network equipment. The lack of patches increases the window of exposure, emphasizing the need for immediate mitigation.
Mitigation Recommendations
1. Network Segmentation: Isolate Tenda G3 routers from critical network segments and restrict access to management interfaces to trusted IP addresses only. 2. Access Controls: Implement firewall rules to block unsolicited inbound traffic to the router’s management ports from untrusted networks, especially the internet. 3. Disable Guest Wi-Fi: If guest Wi-Fi functionality is not essential, disable it to reduce the attack surface related to the vulnerable guestWifiRuleRefresh function. 4. Monitor Network Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous requests targeting the gstUp parameter or unusual traffic patterns indicative of exploitation attempts. 5. Vendor Engagement: Regularly check for firmware updates or security advisories from Tenda and apply patches immediately once available. 6. Device Replacement: For critical environments, consider replacing vulnerable Tenda G3 routers with devices from vendors with stronger security track records and timely patch management. 7. Incident Response Preparation: Prepare to quickly respond to DoS incidents by having backup connectivity options and procedures to reset or reconfigure affected routers. 8. User Awareness: Educate network administrators about this vulnerability and the importance of restricting router management access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-57070: n/a
Description
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the gstUp parameter in the guestWifiRuleRefresh function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-57070 is a high-severity vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw is a stack-based buffer overflow occurring in the gstUp parameter within the guestWifiRuleRefresh function. This vulnerability arises when the router processes a specially crafted request that manipulates the gstUp parameter, leading to a stack overflow condition. Such a condition can overwrite critical memory regions, destabilizing the device's operation and causing a Denial of Service (DoS). The vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network (AV:N, PR:N, UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) but no direct impact on confidentiality or integrity. The underlying weakness corresponds to CWE-121, a classic stack-based buffer overflow, which is a well-known and dangerous class of vulnerabilities. No patches or known exploits in the wild have been reported yet. The vulnerability affects the Tenda G3 router, a consumer and small office networking device, which is commonly used to provide Wi-Fi connectivity including guest network functionality. The guestWifiRuleRefresh function likely manages guest Wi-Fi access rules, and the gstUp parameter is presumably part of the input controlling these rules. Exploiting this flaw can cause the router to crash or reboot, disrupting network availability for users relying on the device.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home offices that use Tenda G3 routers, this vulnerability poses a significant risk to network availability. A successful exploit can cause network outages by crashing the router, leading to loss of internet connectivity and disruption of business operations. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting DoS can impact productivity and availability of critical services. In environments where guest Wi-Fi access is used to segregate visitor traffic, this vulnerability could be leveraged to disrupt network segmentation policies, potentially increasing exposure to other threats. Additionally, if attackers use this DoS as a distraction, it could facilitate other attacks during the downtime. Given the ease of exploitation (no authentication or user interaction required), attackers can remotely target vulnerable routers, including those exposed to the internet or accessible from local networks. This is particularly concerning for organizations with limited IT security management or outdated network equipment. The lack of patches increases the window of exposure, emphasizing the need for immediate mitigation.
Mitigation Recommendations
1. Network Segmentation: Isolate Tenda G3 routers from critical network segments and restrict access to management interfaces to trusted IP addresses only. 2. Access Controls: Implement firewall rules to block unsolicited inbound traffic to the router’s management ports from untrusted networks, especially the internet. 3. Disable Guest Wi-Fi: If guest Wi-Fi functionality is not essential, disable it to reduce the attack surface related to the vulnerable guestWifiRuleRefresh function. 4. Monitor Network Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous requests targeting the gstUp parameter or unusual traffic patterns indicative of exploitation attempts. 5. Vendor Engagement: Regularly check for firmware updates or security advisories from Tenda and apply patches immediately once available. 6. Device Replacement: For critical environments, consider replacing vulnerable Tenda G3 routers with devices from vendors with stronger security track records and timely patch management. 7. Incident Response Preparation: Prepare to quickly respond to DoS incidents by having backup connectivity options and procedures to reset or reconfigure affected routers. 8. User Awareness: Educate network administrators about this vulnerability and the importance of restricting router management access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c0983d9ed239a66bacc120
Added to database: 9/9/2025, 9:12:29 PM
Last enriched: 9/17/2025, 1:08:48 AM
Last updated: 10/30/2025, 8:24:14 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.