CVE-2025-57078: n/a
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-57078 is a stack overflow vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw exists in the handling of the pppoeServerWhiteMacIndex parameter within the formModifyPppAuthWhiteMac function. Specifically, this parameter is not properly validated or sanitized, allowing an attacker to craft a malicious request that triggers a stack overflow condition. This vulnerability can be exploited remotely by sending a specially crafted request to the affected device, causing it to crash or become unresponsive, resulting in a Denial of Service (DoS). The vulnerability does not require authentication or user interaction, increasing its potential for exploitation. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the widespread use of Tenda routers in consumer and small business environments make it a significant concern. The lack of a CVSS score indicates that the vulnerability is newly disclosed and has not yet undergone formal severity assessment. The stack overflow could potentially be leveraged for further attacks, such as remote code execution, but currently, only DoS impact is confirmed.
Potential Impact
For European organizations, the primary impact of CVE-2025-57078 is service disruption due to Denial of Service on network infrastructure devices using the affected Tenda G3 firmware. This can lead to loss of internet connectivity, interruption of business operations, and potential cascading effects on dependent services. Small and medium enterprises (SMEs) and home offices that rely on Tenda routers for their network connectivity are particularly vulnerable. The disruption could affect remote work capabilities, VoIP communications, and access to cloud services. Additionally, the downtime could expose organizations to secondary risks such as delayed incident response or inability to access security monitoring tools. While the vulnerability currently only enables DoS, the stack overflow nature suggests a risk of escalation if further exploitation techniques are developed. The absence of known exploits provides a window for mitigation before active attacks emerge.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda G3 routers running firmware version 3.0br_V15.11.0.17. Since no official patch links are currently available, it is critical to monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators should implement network-level protections such as firewall rules to restrict access to router management interfaces from untrusted networks, especially blocking unsolicited inbound traffic targeting the PPPoE server functionality. Deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect anomalous requests to the pppoeServerWhiteMacIndex parameter can help mitigate exploitation attempts. Organizations should also consider segmenting network devices to limit exposure and enforce strict access controls. Regular backups of router configurations and readiness to perform device reboots can reduce downtime impact. Finally, educating IT staff about the vulnerability and monitoring security advisories will ensure timely response to emerging threats or patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-57078: n/a
Description
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-57078 is a stack overflow vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw exists in the handling of the pppoeServerWhiteMacIndex parameter within the formModifyPppAuthWhiteMac function. Specifically, this parameter is not properly validated or sanitized, allowing an attacker to craft a malicious request that triggers a stack overflow condition. This vulnerability can be exploited remotely by sending a specially crafted request to the affected device, causing it to crash or become unresponsive, resulting in a Denial of Service (DoS). The vulnerability does not require authentication or user interaction, increasing its potential for exploitation. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the widespread use of Tenda routers in consumer and small business environments make it a significant concern. The lack of a CVSS score indicates that the vulnerability is newly disclosed and has not yet undergone formal severity assessment. The stack overflow could potentially be leveraged for further attacks, such as remote code execution, but currently, only DoS impact is confirmed.
Potential Impact
For European organizations, the primary impact of CVE-2025-57078 is service disruption due to Denial of Service on network infrastructure devices using the affected Tenda G3 firmware. This can lead to loss of internet connectivity, interruption of business operations, and potential cascading effects on dependent services. Small and medium enterprises (SMEs) and home offices that rely on Tenda routers for their network connectivity are particularly vulnerable. The disruption could affect remote work capabilities, VoIP communications, and access to cloud services. Additionally, the downtime could expose organizations to secondary risks such as delayed incident response or inability to access security monitoring tools. While the vulnerability currently only enables DoS, the stack overflow nature suggests a risk of escalation if further exploitation techniques are developed. The absence of known exploits provides a window for mitigation before active attacks emerge.
Mitigation Recommendations
Organizations should immediately identify and inventory all Tenda G3 routers running firmware version 3.0br_V15.11.0.17. Since no official patch links are currently available, it is critical to monitor Tenda's official channels for firmware updates addressing this vulnerability. In the interim, network administrators should implement network-level protections such as firewall rules to restrict access to router management interfaces from untrusted networks, especially blocking unsolicited inbound traffic targeting the PPPoE server functionality. Deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect anomalous requests to the pppoeServerWhiteMacIndex parameter can help mitigate exploitation attempts. Organizations should also consider segmenting network devices to limit exposure and enforce strict access controls. Regular backups of router configurations and readiness to perform device reboots can reduce downtime impact. Finally, educating IT staff about the vulnerability and monitoring security advisories will ensure timely response to emerging threats or patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c064ee22bccc7413ab98b6
Added to database: 9/9/2025, 5:33:34 PM
Last enriched: 9/9/2025, 5:35:20 PM
Last updated: 9/9/2025, 9:12:27 PM
Views: 3
Related Threats
CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
CriticalCVE-2025-59036: CWE-298: Improper Validation of Certificate Expiration in opsmill infrahub
MediumCVE-2025-10171: Buffer Overflow in UTT 1250GW
HighCVE-2025-54260: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Modeler
HighCVE-2025-54259: Integer Overflow or Wraparound (CWE-190) in Adobe Substance3D - Modeler
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.