Skip to main content

CVE-2025-57072: n/a

High
VulnerabilityCVE-2025-57072cvecve-2025-57072
Published: Tue Sep 09 2025 (09/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the staticRouteGateway parameter in the formSetStaticRoute function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 09/09/2025, 16:58:34 UTC

Technical Analysis

CVE-2025-57072 is a stack overflow vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw resides in the handling of the staticRouteGateway parameter within the formSetStaticRoute function. Specifically, the vulnerability occurs when an attacker sends a crafted request that manipulates the staticRouteGateway parameter, causing a stack overflow condition. This type of memory corruption can lead to a Denial of Service (DoS) by crashing the device or causing it to become unresponsive. The vulnerability does not appear to allow for remote code execution or privilege escalation based on the available information, but the DoS impact alone can disrupt network connectivity. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability affects a specific firmware version of the Tenda G3 router, a consumer-grade networking device commonly used for home and small office internet access. The lack of patch information suggests that a fix may not yet be available, increasing the urgency for affected users to apply any forthcoming updates or implement mitigations. The vulnerability requires an attacker to send a specially crafted request to the router’s management interface, which may be accessible remotely if the device is misconfigured or exposed to the internet. This increases the attack surface, especially for devices with default or weak security settings.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns network availability and operational continuity. Tenda routers are widely used in residential and small business environments across Europe, meaning that compromised devices could disrupt internet access and internal network routing. This could lead to productivity losses, interruption of business-critical communications, and potential cascading effects on connected systems reliant on stable network infrastructure. While the vulnerability does not currently indicate data breach risks or integrity compromise, the denial of service could be exploited as part of a larger attack campaign targeting network infrastructure. Organizations relying on Tenda G3 routers without proper network segmentation or exposure controls may face increased risk. Additionally, service providers or managed service providers (MSPs) using these devices in customer premises equipment (CPE) roles could see customer impact and reputational damage if devices become non-functional due to exploitation.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda G3 routers from critical infrastructure and sensitive networks to limit the impact of any potential DoS. 2. Restrict management interface access: Ensure that the router’s management interface is not exposed to the public internet. Use firewall rules or VPNs to limit access only to trusted administrators. 3. Monitor network traffic for anomalous requests targeting staticRouteGateway parameters or unusual management interface activity. 4. Apply firmware updates promptly once a patch is released by Tenda. Regularly check vendor advisories for updates related to this vulnerability. 5. Employ network-level DoS protection mechanisms such as rate limiting or intrusion prevention systems (IPS) to detect and block malformed requests. 6. Educate users and administrators about the risks of default credentials and encourage strong password policies to reduce the risk of unauthorized access. 7. Consider replacing vulnerable devices with alternative hardware if patches are delayed or unavailable, especially in critical environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c05ca9440e1c113d243f2d

Added to database: 9/9/2025, 4:58:17 PM

Last enriched: 9/9/2025, 4:58:34 PM

Last updated: 9/9/2025, 5:59:45 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats