Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57087: n/a

0
High
VulnerabilityCVE-2025-57087cvecve-2025-57087
Published: Tue Sep 09 2025 (09/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda W30E V16.01.0.19 (5037) was discovered to contain a stack overflow in the countryCode parameter in the werlessAdvancedSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:09:36 UTC

Technical Analysis

CVE-2025-57087 is a high-severity vulnerability identified in the Tenda W30E router firmware version V16.01.0.19 (build 5037). The flaw is a stack-based buffer overflow located in the handling of the 'countryCode' parameter within the 'werlessAdvancedSet' function. This vulnerability arises because the input to the countryCode parameter is not properly validated or bounds-checked, allowing an attacker to send a crafted request that overflows the stack buffer. The consequence of this overflow is a Denial of Service (DoS) condition, where the router may crash or become unresponsive, disrupting network connectivity. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no known exploits are currently reported in the wild, the ease of exploitation and the critical network role of the affected device make this a significant threat. The vulnerability is classified under CWE-121, which corresponds to classic stack-based buffer overflow issues, often leading to crashes or potential code execution if further exploited. However, in this case, the impact is limited to availability disruption. No patches or mitigation links have been published yet, indicating that affected users and organizations must be vigilant and consider interim protective measures.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Tenda W30E routers in their network infrastructure. The DoS condition can lead to network outages, interrupting business operations, communications, and access to critical services. This is particularly concerning for sectors requiring high availability such as finance, healthcare, and public administration. The disruption could also affect remote work capabilities and IoT device connectivity if these routers are used in home or branch office environments. Given the vulnerability requires no authentication and can be triggered remotely, attackers could leverage this flaw to cause widespread network instability or targeted disruption campaigns. Although no data confidentiality or integrity is directly compromised, the loss of availability can indirectly impact operational security and compliance with regulations such as GDPR if services are interrupted.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Immediately identify and inventory all Tenda W30E routers in use, including those in remote or branch locations. 2) Restrict network access to the router management interfaces by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks, especially the internet. 3) Disable or restrict remote management features if not essential, reducing the attack surface. 4) Monitor network traffic for unusual or malformed requests targeting the 'countryCode' parameter or related management endpoints, using intrusion detection/prevention systems (IDS/IPS) with custom signatures if possible. 5) Prepare incident response plans to quickly recover from potential DoS events, including router reboots or replacements. 6) Engage with Tenda support channels to obtain firmware updates or security advisories and plan for timely patch deployment once available. 7) Consider temporary replacement of vulnerable devices in critical environments with alternative hardware until a fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c060cd5eede281431406ae

Added to database: 9/9/2025, 5:15:57 PM

Last enriched: 9/17/2025, 1:09:36 AM

Last updated: 10/30/2025, 4:51:33 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats