CVE-2025-60339: n/a
Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the schedStartTime and schedEndTime parameters.
AI Analysis
Technical Summary
CVE-2025-60339 identifies multiple buffer overflow vulnerabilities in the openSchedWifi function of the Tenda AC6 router firmware version 15.03.06.50. The vulnerability arises from improper handling of the schedStartTime and schedEndTime parameters, which accept user-supplied input without adequate bounds checking. An attacker can craft malicious payloads targeting these parameters to overflow internal buffers, leading to memory corruption. This corruption can cause the router to crash or reboot, resulting in a denial of service (DoS) condition that disrupts network availability. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing the attack surface. The CVSS 3.1 base score of 7.5 reflects the high severity due to the ease of exploitation (network vector, low complexity), no privileges or user interaction needed, and the impact limited to availability (no confidentiality or integrity loss). Although no public exploits are currently known, the presence of such a vulnerability in widely deployed consumer and small business routers poses a significant risk. The CWE-120 classification confirms this is a classic buffer overflow issue, which may also open avenues for further exploitation if combined with other vulnerabilities. The lack of available patches at the time of publication necessitates immediate mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability can cause significant network disruptions by rendering Tenda AC6 routers inoperative through denial of service attacks. This can affect business continuity, especially for small and medium enterprises relying on these routers for internet connectivity and internal network access. The loss of router availability may lead to downtime, impacting productivity and potentially causing financial losses. In critical infrastructure or service provider environments where Tenda devices are deployed, the impact could extend to broader service outages. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, the availability impact alone can be severe. The ease of remote exploitation without authentication means attackers can launch attacks from anywhere, increasing the risk of widespread disruption. European organizations with limited IT security resources may find it challenging to detect and respond to such attacks promptly. Additionally, the potential for attackers to use this vulnerability as a stepping stone for further attacks on network infrastructure cannot be discounted.
Mitigation Recommendations
1. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-60339 and apply patches immediately upon release. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3. Disable remote management features on Tenda AC6 routers unless absolutely necessary, reducing exposure to external attackers. 4. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous traffic patterns targeting schedStartTime and schedEndTime parameters or unusual router behavior indicative of exploitation attempts. 5. Conduct regular network audits to identify Tenda AC6 devices and assess their firmware versions to prioritize patching. 6. Educate network administrators on recognizing signs of router instability or DoS conditions potentially caused by exploitation of this vulnerability. 7. Consider deploying network redundancy and failover mechanisms to maintain connectivity in case of router failure. 8. For organizations using Tenda AC6 routers in critical roles, evaluate alternative hardware with better security track records to reduce future risk.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-60339: n/a
Description
Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the schedStartTime and schedEndTime parameters.
AI-Powered Analysis
Technical Analysis
CVE-2025-60339 identifies multiple buffer overflow vulnerabilities in the openSchedWifi function of the Tenda AC6 router firmware version 15.03.06.50. The vulnerability arises from improper handling of the schedStartTime and schedEndTime parameters, which accept user-supplied input without adequate bounds checking. An attacker can craft malicious payloads targeting these parameters to overflow internal buffers, leading to memory corruption. This corruption can cause the router to crash or reboot, resulting in a denial of service (DoS) condition that disrupts network availability. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing the attack surface. The CVSS 3.1 base score of 7.5 reflects the high severity due to the ease of exploitation (network vector, low complexity), no privileges or user interaction needed, and the impact limited to availability (no confidentiality or integrity loss). Although no public exploits are currently known, the presence of such a vulnerability in widely deployed consumer and small business routers poses a significant risk. The CWE-120 classification confirms this is a classic buffer overflow issue, which may also open avenues for further exploitation if combined with other vulnerabilities. The lack of available patches at the time of publication necessitates immediate mitigation through network controls and monitoring.
Potential Impact
For European organizations, this vulnerability can cause significant network disruptions by rendering Tenda AC6 routers inoperative through denial of service attacks. This can affect business continuity, especially for small and medium enterprises relying on these routers for internet connectivity and internal network access. The loss of router availability may lead to downtime, impacting productivity and potentially causing financial losses. In critical infrastructure or service provider environments where Tenda devices are deployed, the impact could extend to broader service outages. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, the availability impact alone can be severe. The ease of remote exploitation without authentication means attackers can launch attacks from anywhere, increasing the risk of widespread disruption. European organizations with limited IT security resources may find it challenging to detect and respond to such attacks promptly. Additionally, the potential for attackers to use this vulnerability as a stepping stone for further attacks on network infrastructure cannot be discounted.
Mitigation Recommendations
1. Monitor Tenda’s official channels for firmware updates addressing CVE-2025-60339 and apply patches immediately upon release. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3. Disable remote management features on Tenda AC6 routers unless absolutely necessary, reducing exposure to external attackers. 4. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous traffic patterns targeting schedStartTime and schedEndTime parameters or unusual router behavior indicative of exploitation attempts. 5. Conduct regular network audits to identify Tenda AC6 devices and assess their firmware versions to prioritize patching. 6. Educate network administrators on recognizing signs of router instability or DoS conditions potentially caused by exploitation of this vulnerability. 7. Consider deploying network redundancy and failover mechanisms to maintain connectivity in case of router failure. 8. For organizations using Tenda AC6 routers in critical roles, evaluate alternative hardware with better security track records to reduce future risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f915e12887d40ca3b4b710
Added to database: 10/22/2025, 5:35:29 PM
Last enriched: 10/29/2025, 5:49:42 PM
Last updated: 12/5/2025, 11:30:19 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66200: mod_userdir+suexec bypass via AllowOverride FileInfo in Apache Software Foundation Apache HTTP Server
HighCVE-2025-65082: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache HTTP Server
UnknownCVE-2025-59775: CWE-918 Server-Side Request Forgery (SSRF) in Apache Software Foundation Apache HTTP Server
UnknownCVE-2025-55753: CWE-190 Integer Overflow or Wraparound in Apache Software Foundation Apache HTTP Server
UnknownCacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.