CVE-2025-60342: n/a
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the addressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
AI Analysis
Technical Summary
CVE-2025-60342 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 V2.0 router firmware version 15.03.06.50. The vulnerability resides in the addressNat function, specifically in the handling of the page parameter, which does not properly validate input size, leading to a stack overflow condition. This flaw allows an unauthenticated remote attacker to send a specially crafted request to the router, triggering the overflow and causing the device to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability requires no privileges or user interaction and can be exploited remotely over the network, making it highly accessible to attackers scanning for vulnerable devices. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no confidentiality or integrity impact. The vulnerability is categorized under CWE-121 (Stack-based Buffer Overflow), a common and well-understood flaw type. No patches or official mitigations have been published by Tenda as of the vulnerability disclosure date. While no known exploits are currently active in the wild, the simplicity of the attack vector and the critical nature of network availability make this a significant threat. The affected product, Tenda AC6, is a consumer-grade router commonly used in home and small office environments, which may lack robust security monitoring and controls.
Potential Impact
The primary impact of CVE-2025-60342 is on the availability of network services relying on the Tenda AC6 routers. Successful exploitation results in device crashes or reboots, causing temporary loss of internet connectivity and disruption of internal network communications. For European organizations, especially small and medium enterprises (SMEs) and home office users who deploy these routers, this can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous network access. While the vulnerability does not compromise confidentiality or integrity, the denial of service can affect business continuity and may expose organizations to follow-on attacks during recovery periods. The lack of authentication requirements and ease of remote exploitation increase the risk of widespread scanning and attack attempts. In sectors where network uptime is critical, such as healthcare, finance, or remote work environments prevalent in Europe, the impact could be more severe. Additionally, disruption in connectivity may hinder security monitoring and incident response capabilities.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level controls: restrict WAN access to the router's management interfaces using firewall rules or access control lists to prevent unauthorized external access. 2. Segment networks to isolate critical systems from consumer-grade routers vulnerable to exploitation. 3. Monitor network traffic for unusual or malformed requests targeting the addressNat function or the page parameter to detect potential exploitation attempts. 4. Engage with Tenda support channels to obtain information on firmware updates or patches addressing this vulnerability; apply updates promptly once available. 5. Consider replacing vulnerable Tenda AC6 routers with devices from vendors with a strong security track record and timely patch management. 6. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong password policies. 7. Implement network redundancy where possible to minimize downtime in case of device failure due to exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60342: n/a
Description
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the addressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
AI-Powered Analysis
Technical Analysis
CVE-2025-60342 is a stack-based buffer overflow vulnerability identified in the Tenda AC6 V2.0 router firmware version 15.03.06.50. The vulnerability resides in the addressNat function, specifically in the handling of the page parameter, which does not properly validate input size, leading to a stack overflow condition. This flaw allows an unauthenticated remote attacker to send a specially crafted request to the router, triggering the overflow and causing the device to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability requires no privileges or user interaction and can be exploited remotely over the network, making it highly accessible to attackers scanning for vulnerable devices. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no confidentiality or integrity impact. The vulnerability is categorized under CWE-121 (Stack-based Buffer Overflow), a common and well-understood flaw type. No patches or official mitigations have been published by Tenda as of the vulnerability disclosure date. While no known exploits are currently active in the wild, the simplicity of the attack vector and the critical nature of network availability make this a significant threat. The affected product, Tenda AC6, is a consumer-grade router commonly used in home and small office environments, which may lack robust security monitoring and controls.
Potential Impact
The primary impact of CVE-2025-60342 is on the availability of network services relying on the Tenda AC6 routers. Successful exploitation results in device crashes or reboots, causing temporary loss of internet connectivity and disruption of internal network communications. For European organizations, especially small and medium enterprises (SMEs) and home office users who deploy these routers, this can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous network access. While the vulnerability does not compromise confidentiality or integrity, the denial of service can affect business continuity and may expose organizations to follow-on attacks during recovery periods. The lack of authentication requirements and ease of remote exploitation increase the risk of widespread scanning and attack attempts. In sectors where network uptime is critical, such as healthcare, finance, or remote work environments prevalent in Europe, the impact could be more severe. Additionally, disruption in connectivity may hinder security monitoring and incident response capabilities.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level controls: restrict WAN access to the router's management interfaces using firewall rules or access control lists to prevent unauthorized external access. 2. Segment networks to isolate critical systems from consumer-grade routers vulnerable to exploitation. 3. Monitor network traffic for unusual or malformed requests targeting the addressNat function or the page parameter to detect potential exploitation attempts. 4. Engage with Tenda support channels to obtain information on firmware updates or patches addressing this vulnerability; apply updates promptly once available. 5. Consider replacing vulnerable Tenda AC6 routers with devices from vendors with a strong security track record and timely patch management. 6. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong password policies. 7. Implement network redundancy where possible to minimize downtime in case of device failure due to exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f91cdf2887d40ca3c19bc0
Added to database: 10/22/2025, 6:05:19 PM
Last enriched: 10/29/2025, 7:04:21 PM
Last updated: 12/4/2025, 8:11:23 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.