Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60341: n/a

0
Unknown
VulnerabilityCVE-2025-60341cvecve-2025-60341
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the ssid parameter in the fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

AILast updated: 10/22/2025, 18:05:12 UTC

Technical Analysis

CVE-2025-60341 identifies a stack overflow vulnerability in the Tenda AC6 V2.0 router firmware version 15.03.06.50. The flaw resides in the fast_setting_wifi_set function, specifically in the handling of the ssid parameter. When a specially crafted input is provided to this parameter, it causes a stack overflow condition, which can lead to a Denial of Service (DoS) by crashing the device or causing it to become unresponsive. This vulnerability does not require authentication, meaning an attacker can exploit it remotely if the router's management interface is exposed or accessible within the network. The absence of a CVSS score indicates that the vulnerability is newly published and has not yet been fully assessed. No known exploits are currently in the wild, but the nature of stack overflow vulnerabilities typically allows for relatively straightforward exploitation. The impact is primarily a DoS condition, disrupting network connectivity and potentially affecting dependent services. The vulnerability affects a specific firmware version of the Tenda AC6 router, a device commonly used in small office and home office environments. Because the vulnerability targets a network device, exploitation could have cascading effects on organizational network availability and security posture.

Potential Impact

For European organizations, the primary impact of CVE-2025-60341 is the potential for network disruption due to Denial of Service on affected Tenda AC6 routers. This can lead to loss of internet connectivity, interruption of business operations, and degraded productivity, especially in environments relying on these routers for critical connectivity. Small and medium enterprises (SMEs) and home offices using this device are particularly vulnerable. Additionally, network outages could affect VoIP services, cloud access, and internal communications. While the vulnerability does not directly lead to data breaches or privilege escalation, the resulting downtime can have financial and reputational consequences. In sectors such as finance, healthcare, and manufacturing, where continuous network availability is crucial, the impact could be significant. The lack of known exploits reduces immediate risk, but the ease of triggering a stack overflow without authentication means attackers could leverage this vulnerability opportunistically. Organizations with exposed or poorly secured router management interfaces face higher risk. The impact is thus primarily on availability, with indirect effects on operational continuity.

Mitigation Recommendations

To mitigate CVE-2025-60341, organizations should first verify if they use the Tenda AC6 V2.0 router with firmware version 15.03.06.50. If so, they should monitor Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. Until a patch is released, restrict access to router management interfaces by implementing network segmentation and firewall rules that limit administrative access to trusted IP addresses only. Disable remote management features if not required, and enforce strong authentication mechanisms for local access. Regularly audit network devices for unusual behavior or crashes that could indicate exploitation attempts. Employ network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns targeting router configuration endpoints. Additionally, consider replacing vulnerable devices with models from vendors with more robust security update practices if patching is delayed. Educate IT staff on the signs of router compromise and ensure incident response plans include steps for network device failures. Finally, maintain backups of router configurations to enable quick recovery after an incident.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f919682887d40ca3ba54fb

Added to database: 10/22/2025, 5:50:32 PM

Last enriched: 10/22/2025, 6:05:12 PM

Last updated: 10/22/2025, 9:36:53 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats