Skip to main content

CVE-2025-57573: n/a

Medium
VulnerabilityCVE-2025-57573cvecve-2025-57573
Published: Wed Sep 10 2025 (09/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi.

AI-Powered Analysis

AILast updated: 09/10/2025, 15:46:57 UTC

Technical Analysis

CVE-2025-57573 is a buffer overflow vulnerability identified in the Tenda F3 router firmware version V12.01.01.48_multi and later. The vulnerability arises from improper handling of the 'wifiTimeClose' parameter within the 'goform/setWifi' endpoint, which is likely part of the router's web-based management interface. A buffer overflow occurs when the input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system crashes. Since the vulnerability is in the router's firmware, exploitation could allow an attacker to gain control over the device, manipulate network traffic, or pivot to other devices on the network. The absence of a CVSS score and known exploits in the wild indicates this is a recently disclosed vulnerability with limited public exploitation information. However, buffer overflow vulnerabilities in network infrastructure devices are typically severe due to their potential to compromise network integrity and confidentiality. The vulnerability likely requires sending a specially crafted HTTP request to the router's management interface targeting the 'wifiTimeClose' parameter, which may or may not require authentication depending on the router's configuration. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation through other means.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Tenda F3 routers in their network infrastructure. Successful exploitation could lead to unauthorized access to the router, enabling attackers to intercept or redirect network traffic, disrupt internet connectivity, or launch further attacks within the internal network. This could compromise sensitive data confidentiality and network availability. Small and medium enterprises (SMEs) and home office environments using these routers are particularly at risk due to potentially weaker network security controls. Additionally, critical infrastructure sectors that depend on reliable network connectivity could face operational disruptions. Given the router's role as a gateway device, exploitation could undermine the integrity of connected systems and data flows, posing risks to compliance with European data protection regulations such as GDPR.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda F3 routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces or restrict access to trusted IP addresses to reduce exposure to external attackers. 3. Monitor network traffic for unusual activity or unexpected requests targeting the 'goform/setWifi' endpoint. 4. Implement strict input validation and firewall rules at the network perimeter to block malformed HTTP requests. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. If possible, replace vulnerable devices with routers from vendors with timely security update practices. 7. Educate network administrators about the vulnerability to ensure rapid detection and response. 8. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c19d54cce016a9a48210d5

Added to database: 9/10/2025, 3:46:28 PM

Last enriched: 9/10/2025, 3:46:57 PM

Last updated: 9/10/2025, 9:59:02 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats