Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60342: n/a

0
Unknown
VulnerabilityCVE-2025-60342cvecve-2025-60342
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the addressNat function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

AILast updated: 10/22/2025, 18:10:51 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60342 affects the Tenda AC6 V2.0 router firmware version 15.03.06.50. It is a stack overflow issue located in the page parameter of the addressNat function, which is responsible for handling network address translation settings. A stack overflow occurs when more data is written to a buffer than it can hold, overwriting adjacent memory and potentially causing the program to crash or behave unpredictably. In this case, an attacker can send specially crafted input to the vulnerable parameter, triggering the overflow and causing the router to crash or reboot, resulting in a Denial of Service (DoS). This disrupts network availability for users relying on the device. The vulnerability does not require authentication, meaning an attacker can exploit it remotely if the router’s management interface is exposed or accessible from the attacker’s network. No public exploits have been reported yet, and no official patch or firmware update has been linked, indicating that the vulnerability is newly disclosed. The lack of a CVSS score requires an assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope. Since the vulnerability primarily affects availability and can be exploited remotely without authentication, it poses a moderate risk. The affected device is a consumer-grade router commonly used in small office and home environments, which may be deployed in European organizations with limited IT security controls. The absence of a patch necessitates immediate mitigation steps to limit exposure and prevent potential exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2025-60342 is the potential disruption of network services due to router crashes or reboots caused by the stack overflow. This can lead to temporary loss of internet connectivity, interruption of business operations, and reduced productivity, especially for small businesses or remote workers relying on Tenda AC6 routers. The vulnerability does not appear to allow data theft or privilege escalation, so confidentiality and integrity impacts are minimal. However, availability is significantly affected, which can have cascading effects on communication, access to cloud services, and remote work capabilities. Organizations with limited IT support or those that do not regularly update router firmware are at higher risk. Additionally, if attackers combine this DoS vulnerability with other network attacks, it could facilitate more complex intrusion attempts or ransomware deployment by creating network instability. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

1. Monitor for firmware updates from Tenda and apply patches promptly once available to remediate the stack overflow vulnerability. 2. Restrict access to the router’s management interface by disabling remote administration or limiting it to trusted IP addresses only. 3. Implement network segmentation to isolate critical systems from devices using vulnerable routers, reducing potential impact. 4. Employ firewall rules to block unsolicited traffic targeting the router’s management ports from untrusted networks. 5. Regularly audit network devices to identify Tenda AC6 routers running vulnerable firmware versions and replace or upgrade them if patching is not feasible. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns that may indicate exploitation attempts. 7. Educate users about the risks of exposing router management interfaces and encourage secure configuration practices. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f91cdf2887d40ca3c19bc0

Added to database: 10/22/2025, 6:05:19 PM

Last enriched: 10/22/2025, 6:10:51 PM

Last updated: 10/22/2025, 8:39:14 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats