CVE-2025-57078: n/a
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI Analysis
Technical Summary
CVE-2025-57078 is a high-severity stack overflow vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw exists in the formModifyPppAuthWhiteMac function, specifically in the handling of the pppoeServerWhiteMacIndex parameter. This parameter is vulnerable to a stack-based buffer overflow, which can be triggered by sending a specially crafted request to the affected device. Exploitation of this vulnerability does not require any authentication or user interaction, and the attacker can remotely cause a Denial of Service (DoS) condition by crashing the device or causing it to become unresponsive. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), indicating improper bounds checking on stack memory. The CVSS v3.1 base score is 7.5, reflecting a high severity due to its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise reported. No public exploits are currently known, and no patches have been linked yet, which suggests that affected organizations should prioritize monitoring and mitigation efforts. Given the nature of the vulnerability, attackers could disrupt network connectivity and services relying on the Tenda G3 router, potentially impacting business operations and causing downtime.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Tenda G3 routers in their network infrastructure. The DoS condition could disrupt internet connectivity, VPN access, or other PPPoE-based services, leading to operational interruptions. Critical sectors such as finance, healthcare, and government agencies that depend on continuous network availability could face service outages, affecting productivity and potentially causing financial losses. Additionally, organizations with remote or branch offices using these routers might experience isolated network failures, complicating incident response and recovery. Although the vulnerability does not directly expose sensitive data or allow unauthorized access, the resulting downtime could indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or delaying security updates. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda G3 routers running the vulnerable firmware version 3.0br_V15.11.0.17. Until an official patch is released, network administrators should implement network-level protections such as firewall rules to restrict access to the router's management interfaces and PPPoE services from untrusted networks. Disabling PPPoE server functionality if not required can reduce the attack surface. Monitoring network traffic for unusual or malformed PPPoE requests can help detect attempted exploitation. Additionally, organizations should segment networks to isolate critical systems from affected devices and prepare incident response plans to quickly restore service in case of a DoS event. Regularly checking for firmware updates from Tenda and applying them promptly once available is essential. Where possible, consider replacing vulnerable devices with models that have a stronger security track record or vendor support.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-57078: n/a
Description
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
AI-Powered Analysis
Technical Analysis
CVE-2025-57078 is a high-severity stack overflow vulnerability identified in the Tenda G3 router firmware version 3.0br_V15.11.0.17. The flaw exists in the formModifyPppAuthWhiteMac function, specifically in the handling of the pppoeServerWhiteMacIndex parameter. This parameter is vulnerable to a stack-based buffer overflow, which can be triggered by sending a specially crafted request to the affected device. Exploitation of this vulnerability does not require any authentication or user interaction, and the attacker can remotely cause a Denial of Service (DoS) condition by crashing the device or causing it to become unresponsive. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), indicating improper bounds checking on stack memory. The CVSS v3.1 base score is 7.5, reflecting a high severity due to its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise reported. No public exploits are currently known, and no patches have been linked yet, which suggests that affected organizations should prioritize monitoring and mitigation efforts. Given the nature of the vulnerability, attackers could disrupt network connectivity and services relying on the Tenda G3 router, potentially impacting business operations and causing downtime.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Tenda G3 routers in their network infrastructure. The DoS condition could disrupt internet connectivity, VPN access, or other PPPoE-based services, leading to operational interruptions. Critical sectors such as finance, healthcare, and government agencies that depend on continuous network availability could face service outages, affecting productivity and potentially causing financial losses. Additionally, organizations with remote or branch offices using these routers might experience isolated network failures, complicating incident response and recovery. Although the vulnerability does not directly expose sensitive data or allow unauthorized access, the resulting downtime could indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or delaying security updates. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Tenda G3 routers running the vulnerable firmware version 3.0br_V15.11.0.17. Until an official patch is released, network administrators should implement network-level protections such as firewall rules to restrict access to the router's management interfaces and PPPoE services from untrusted networks. Disabling PPPoE server functionality if not required can reduce the attack surface. Monitoring network traffic for unusual or malformed PPPoE requests can help detect attempted exploitation. Additionally, organizations should segment networks to isolate critical systems from affected devices and prepare incident response plans to quickly restore service in case of a DoS event. Regularly checking for firmware updates from Tenda and applying them promptly once available is essential. Where possible, consider replacing vulnerable devices with models that have a stronger security track record or vendor support.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c064ee22bccc7413ab98b6
Added to database: 9/9/2025, 5:33:34 PM
Last enriched: 9/17/2025, 1:09:24 AM
Last updated: 10/30/2025, 4:13:04 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61118: n/a
UnknownCVE-2025-11998: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in HP Inc. Card Readers B Model
MediumCVE-2025-12516: CWE-394 Unexpected Status Code or Return Value in Azure Access Technology BLU-IC2
CriticalCVE-2025-12515: CWE-394 Unexpected Status Code or Return Value in Azure Access Technology BLU-IC2
CriticalCVE-2025-61117: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.