CVE-2025-60338: n/a
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the DhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
AI Analysis
Technical Summary
CVE-2025-60338 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 V2.0 router firmware version 15.03.06.50, specifically within the DhcpListClient function. The vulnerability arises from improper handling of the 'page' parameter, which can be manipulated by an attacker to overflow the stack. This overflow can lead to a denial of service (DoS) condition by crashing the device or causing it to become unresponsive. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it particularly dangerous for exposed devices. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct compromise of confidentiality or integrity. Currently, there are no patches or firmware updates publicly available to remediate this issue, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-787 (Out-of-bounds Write), a common weakness that can lead to memory corruption and system instability. Organizations using Tenda AC6 routers should be aware of this vulnerability as it could disrupt network operations if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-60338 is the potential disruption of network services due to router crashes caused by the stack overflow. This can lead to denial of service conditions affecting business continuity, especially for small and medium enterprises or branch offices relying on Tenda AC6 routers for internet connectivity. Critical infrastructure sectors such as healthcare, finance, and manufacturing could face operational interruptions if these devices are targeted. Although the vulnerability does not allow data theft or manipulation, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or causing delays in security monitoring. The lack of authentication requirement and ease of exploitation increase the risk of automated scanning and attacks, potentially amplifying the impact across multiple organizations. Additionally, since no patches are currently available, affected entities may need to rely on network-level mitigations, which might not fully prevent exploitation, thereby prolonging exposure.
Mitigation Recommendations
1. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60338 and apply them immediately upon release. 2. Until patches are available, restrict access to the router's management interfaces and DHCP services by implementing network segmentation and firewall rules that limit inbound traffic to trusted sources only. 3. Employ intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious packets targeting the DhcpListClient function or unusual traffic patterns on the affected router. 4. Regularly audit network devices to identify the presence of Tenda AC6 routers running vulnerable firmware and consider replacing them with more secure alternatives if patching is not feasible. 5. Educate network administrators about the vulnerability and encourage proactive monitoring of router logs for signs of exploitation attempts. 6. Implement network redundancy and failover mechanisms to minimize service disruption in case of a successful DoS attack exploiting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60338: n/a
Description
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the DhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
AI-Powered Analysis
Technical Analysis
CVE-2025-60338 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 V2.0 router firmware version 15.03.06.50, specifically within the DhcpListClient function. The vulnerability arises from improper handling of the 'page' parameter, which can be manipulated by an attacker to overflow the stack. This overflow can lead to a denial of service (DoS) condition by crashing the device or causing it to become unresponsive. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it particularly dangerous for exposed devices. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct compromise of confidentiality or integrity. Currently, there are no patches or firmware updates publicly available to remediate this issue, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-787 (Out-of-bounds Write), a common weakness that can lead to memory corruption and system instability. Organizations using Tenda AC6 routers should be aware of this vulnerability as it could disrupt network operations if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2025-60338 is the potential disruption of network services due to router crashes caused by the stack overflow. This can lead to denial of service conditions affecting business continuity, especially for small and medium enterprises or branch offices relying on Tenda AC6 routers for internet connectivity. Critical infrastructure sectors such as healthcare, finance, and manufacturing could face operational interruptions if these devices are targeted. Although the vulnerability does not allow data theft or manipulation, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or causing delays in security monitoring. The lack of authentication requirement and ease of exploitation increase the risk of automated scanning and attacks, potentially amplifying the impact across multiple organizations. Additionally, since no patches are currently available, affected entities may need to rely on network-level mitigations, which might not fully prevent exploitation, thereby prolonging exposure.
Mitigation Recommendations
1. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60338 and apply them immediately upon release. 2. Until patches are available, restrict access to the router's management interfaces and DHCP services by implementing network segmentation and firewall rules that limit inbound traffic to trusted sources only. 3. Employ intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious packets targeting the DhcpListClient function or unusual traffic patterns on the affected router. 4. Regularly audit network devices to identify the presence of Tenda AC6 routers running vulnerable firmware and consider replacing them with more secure alternatives if patching is not feasible. 5. Educate network administrators about the vulnerability and encourage proactive monitoring of router logs for signs of exploitation attempts. 6. Implement network redundancy and failover mechanisms to minimize service disruption in case of a successful DoS attack exploiting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8fc246e01a0ac47db56a6
Added to database: 10/22/2025, 3:45:40 PM
Last enriched: 10/29/2025, 4:21:11 PM
Last updated: 12/4/2025, 8:29:39 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.