Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60338: n/a

0
High
VulnerabilityCVE-2025-60338cvecve-2025-60338
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the DhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

AILast updated: 10/29/2025, 16:21:11 UTC

Technical Analysis

CVE-2025-60338 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 V2.0 router firmware version 15.03.06.50, specifically within the DhcpListClient function. The vulnerability arises from improper handling of the 'page' parameter, which can be manipulated by an attacker to overflow the stack. This overflow can lead to a denial of service (DoS) condition by crashing the device or causing it to become unresponsive. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it particularly dangerous for exposed devices. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct compromise of confidentiality or integrity. Currently, there are no patches or firmware updates publicly available to remediate this issue, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-787 (Out-of-bounds Write), a common weakness that can lead to memory corruption and system instability. Organizations using Tenda AC6 routers should be aware of this vulnerability as it could disrupt network operations if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-60338 is the potential disruption of network services due to router crashes caused by the stack overflow. This can lead to denial of service conditions affecting business continuity, especially for small and medium enterprises or branch offices relying on Tenda AC6 routers for internet connectivity. Critical infrastructure sectors such as healthcare, finance, and manufacturing could face operational interruptions if these devices are targeted. Although the vulnerability does not allow data theft or manipulation, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or causing delays in security monitoring. The lack of authentication requirement and ease of exploitation increase the risk of automated scanning and attacks, potentially amplifying the impact across multiple organizations. Additionally, since no patches are currently available, affected entities may need to rely on network-level mitigations, which might not fully prevent exploitation, thereby prolonging exposure.

Mitigation Recommendations

1. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60338 and apply them immediately upon release. 2. Until patches are available, restrict access to the router's management interfaces and DHCP services by implementing network segmentation and firewall rules that limit inbound traffic to trusted sources only. 3. Employ intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious packets targeting the DhcpListClient function or unusual traffic patterns on the affected router. 4. Regularly audit network devices to identify the presence of Tenda AC6 routers running vulnerable firmware and consider replacing them with more secure alternatives if patching is not feasible. 5. Educate network administrators about the vulnerability and encourage proactive monitoring of router logs for signs of exploitation attempts. 6. Implement network redundancy and failover mechanisms to minimize service disruption in case of a successful DoS attack exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8fc246e01a0ac47db56a6

Added to database: 10/22/2025, 3:45:40 PM

Last enriched: 10/29/2025, 4:21:11 PM

Last updated: 12/4/2025, 8:29:39 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats