Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60340: n/a

0
High
VulnerabilityCVE-2025-60340cvecve-2025-60340
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Multiple buffer overflows in the SetClientState function of Tenda AC6 v.15.03.06.50 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the limitSpeed, deviceId, and limitSpeedUp parameters.

AI-Powered Analysis

AILast updated: 10/29/2025, 17:42:39 UTC

Technical Analysis

CVE-2025-60340 is a buffer overflow vulnerability identified in the SetClientState function of Tenda AC6 routers running firmware version 15.03.06.50. The vulnerability arises from improper handling of input parameters—specifically limitSpeed, deviceId, and limitSpeedUp—allowing attackers to inject crafted payloads that overflow internal buffers. This leads to a denial of service (DoS) condition by crashing or destabilizing the router's firmware, thereby disrupting network connectivity. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its risk profile. The underlying weakness is classified under CWE-120 (Classic Buffer Overflow), which is a common and critical software flaw. Although no exploits have been observed in the wild, the ease of exploitation and the potential impact on network availability make this a significant threat. The CVSS v3.1 base score of 7.5 reflects a high severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches have been published yet, so affected users must rely on interim mitigations.

Potential Impact

For European organizations, the primary impact is the potential disruption of network services due to router crashes caused by the buffer overflow. This can lead to downtime affecting business operations, especially for organizations relying on Tenda AC6 routers for critical connectivity. While confidentiality and integrity are not directly impacted, the loss of availability can hinder communication, remote work, and access to cloud services. Sectors such as small and medium enterprises, educational institutions, and home office environments that commonly deploy consumer-grade routers like Tenda AC6 are particularly vulnerable. Additionally, any critical infrastructure or service providers using these devices could face operational interruptions. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks targeting exposed routers, potentially leading to widespread denial of service incidents.

Mitigation Recommendations

1. Immediately restrict remote management access to Tenda AC6 routers by disabling WAN-side administration or limiting it to trusted IP addresses. 2. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 3. Monitor network traffic for unusual or malformed packets targeting the limitSpeed, deviceId, and limitSpeedUp parameters to detect potential exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to identify buffer overflow attack patterns against Tenda routers. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with stronger security track records if patches are delayed. 7. Educate network administrators about the vulnerability and ensure secure configuration practices are followed to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f915e12887d40ca3b4b713

Added to database: 10/22/2025, 5:35:29 PM

Last enriched: 10/29/2025, 5:42:39 PM

Last updated: 12/7/2025, 2:31:02 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats