Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60339: n/a

0
Unknown
VulnerabilityCVE-2025-60339cvecve-2025-60339
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the schedStartTime and schedEndTime parameters.

AI-Powered Analysis

AILast updated: 10/22/2025, 17:35:58 UTC

Technical Analysis

CVE-2025-60339 is a security vulnerability identified in the openSchedWifi function of the Tenda AC6 router firmware version 15.03.06.50. The vulnerability arises from multiple buffer overflow conditions triggered by specially crafted inputs to the schedStartTime and schedEndTime parameters. Buffer overflows occur when data exceeds the allocated buffer size, potentially overwriting adjacent memory and causing unpredictable behavior. In this case, the overflow leads to a denial of service (DoS) by crashing or destabilizing the router's scheduling functionality. The openSchedWifi function is likely responsible for managing Wi-Fi scheduling features, such as enabling or disabling wireless access at specified times. An attacker can exploit this vulnerability remotely by injecting malicious payloads into these parameters, causing the device to become unresponsive or reboot. Although no exploits have been reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers seeking to disrupt network availability. No CVSS score has been assigned yet, and no patches have been released at the time of publication. The vulnerability does not require authentication, increasing its risk profile, but successful exploitation requires the attacker to reach the router’s management interface or the service handling these parameters, which may be exposed on local or remote networks depending on configuration.

Potential Impact

For European organizations, the primary impact of CVE-2025-60339 is the potential for denial of service on networks relying on Tenda AC6 routers. Disruption of Wi-Fi scheduling can lead to loss of connectivity for users, impacting business operations, especially in environments dependent on continuous network availability such as offices, retail locations, and public access points. The vulnerability could be exploited to cause repeated outages, leading to productivity loss and increased support costs. In critical infrastructure or industrial environments where network reliability is paramount, such disruptions could have cascading effects. Additionally, if exploited in a coordinated manner, it could be used as part of a broader attack to degrade network services. Since Tenda routers are widely used in small and medium enterprises and home offices across Europe, the scope of affected systems is significant. The lack of authentication requirement for exploitation increases the risk, particularly if router management interfaces are exposed to untrusted networks. However, the absence of known exploits and patches currently limits immediate impact.

Mitigation Recommendations

European organizations should immediately assess their network environments to identify the presence of Tenda AC6 routers running vulnerable firmware versions. Network administrators should restrict access to router management interfaces by implementing strong firewall rules, disabling remote management if not required, and using VPNs for remote access. Monitoring network traffic for unusual requests targeting schedStartTime and schedEndTime parameters can help detect exploitation attempts. Organizations should engage with Tenda for firmware updates and apply patches as soon as they become available. In the interim, consider disabling Wi-Fi scheduling features if feasible to reduce the attack surface. Network segmentation can limit the impact of a compromised device by isolating critical systems from vulnerable routers. Regular backups of router configurations and readiness to perform device resets can aid in recovery from DoS conditions. User education on securing home and office routers is also recommended to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f915e12887d40ca3b4b710

Added to database: 10/22/2025, 5:35:29 PM

Last enriched: 10/22/2025, 5:35:58 PM

Last updated: 10/22/2025, 10:35:29 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats