Skip to main content

CVE-2025-9297: Stack-based Buffer Overflow in Tenda i22

High
VulnerabilityCVE-2025-9297cvecve-2025-9297
Published: Thu Aug 21 2025 (08/21/2025, 12:02:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: i22

Description

A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 08/21/2025, 12:32:54 UTC

Technical Analysis

CVE-2025-9297 is a high-severity stack-based buffer overflow vulnerability found in the Tenda i22 router, specifically version 1.0.0.3(4687). The flaw exists in the function formWeixinAuthInfoGet within the /goform/wxportalauth endpoint. By manipulating the 'Type' argument passed to this function, an attacker can trigger a stack-based buffer overflow condition. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The overflow can potentially allow an attacker to execute arbitrary code with elevated privileges on the affected device, compromising confidentiality, integrity, and availability. The CVSS 4.0 score is 8.7, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:L, UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability affects a specific firmware version of the Tenda i22 router, a device commonly used in small office and home environments for internet connectivity. Given the nature of the flaw, successful exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt network services.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and residential users relying on Tenda i22 routers, this vulnerability poses a significant risk. Compromise of these routers could lead to interception of sensitive data, unauthorized network access, and disruption of business operations. In sectors with stringent data protection regulations like GDPR, such breaches could result in legal and financial penalties. Additionally, compromised routers could serve as footholds for lateral movement within corporate networks or be leveraged in botnet attacks affecting broader infrastructure. The remote exploitability without authentication increases the threat surface, particularly in environments where these devices are directly exposed to the internet or insufficiently segmented from critical assets.

Mitigation Recommendations

1. Immediate firmware update: Organizations and users should check for and apply any official patches or firmware updates from Tenda addressing this vulnerability. If no patch is available, consider upgrading to a newer, unaffected device model. 2. Network segmentation: Isolate Tenda i22 routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Disable or restrict remote management interfaces, especially those exposed to the internet, to reduce attack vectors. 4. Implement firewall rules to block unauthorized access to the /goform/wxportalauth endpoint or related management ports. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or anomalous payloads targeting the vulnerable endpoint. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-9297. 7. Educate users and administrators about the risks and signs of router compromise to enable prompt incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-21T05:20:16.875Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a70e6cad5a09ad0010ba7f

Added to database: 8/21/2025, 12:17:48 PM

Last enriched: 8/21/2025, 12:32:54 PM

Last updated: 8/21/2025, 2:26:50 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats