CVE-2025-9297: Stack-based Buffer Overflow in Tenda i22
A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-9297 is a high-severity stack-based buffer overflow vulnerability found in the Tenda i22 router, specifically version 1.0.0.3(4687). The flaw exists in the function formWeixinAuthInfoGet within the /goform/wxportalauth endpoint. By manipulating the 'Type' argument passed to this function, an attacker can trigger a stack-based buffer overflow condition. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The overflow can potentially allow an attacker to execute arbitrary code with elevated privileges on the affected device, compromising confidentiality, integrity, and availability. The CVSS 4.0 score is 8.7, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:L, UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability affects a specific firmware version of the Tenda i22 router, a device commonly used in small office and home environments for internet connectivity. Given the nature of the flaw, successful exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt network services.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and residential users relying on Tenda i22 routers, this vulnerability poses a significant risk. Compromise of these routers could lead to interception of sensitive data, unauthorized network access, and disruption of business operations. In sectors with stringent data protection regulations like GDPR, such breaches could result in legal and financial penalties. Additionally, compromised routers could serve as footholds for lateral movement within corporate networks or be leveraged in botnet attacks affecting broader infrastructure. The remote exploitability without authentication increases the threat surface, particularly in environments where these devices are directly exposed to the internet or insufficiently segmented from critical assets.
Mitigation Recommendations
1. Immediate firmware update: Organizations and users should check for and apply any official patches or firmware updates from Tenda addressing this vulnerability. If no patch is available, consider upgrading to a newer, unaffected device model. 2. Network segmentation: Isolate Tenda i22 routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Disable or restrict remote management interfaces, especially those exposed to the internet, to reduce attack vectors. 4. Implement firewall rules to block unauthorized access to the /goform/wxportalauth endpoint or related management ports. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or anomalous payloads targeting the vulnerable endpoint. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-9297. 7. Educate users and administrators about the risks and signs of router compromise to enable prompt incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-9297: Stack-based Buffer Overflow in Tenda i22
Description
A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9297 is a high-severity stack-based buffer overflow vulnerability found in the Tenda i22 router, specifically version 1.0.0.3(4687). The flaw exists in the function formWeixinAuthInfoGet within the /goform/wxportalauth endpoint. By manipulating the 'Type' argument passed to this function, an attacker can trigger a stack-based buffer overflow condition. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The overflow can potentially allow an attacker to execute arbitrary code with elevated privileges on the affected device, compromising confidentiality, integrity, and availability. The CVSS 4.0 score is 8.7, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:L, UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability affects a specific firmware version of the Tenda i22 router, a device commonly used in small office and home environments for internet connectivity. Given the nature of the flaw, successful exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or disrupt network services.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and residential users relying on Tenda i22 routers, this vulnerability poses a significant risk. Compromise of these routers could lead to interception of sensitive data, unauthorized network access, and disruption of business operations. In sectors with stringent data protection regulations like GDPR, such breaches could result in legal and financial penalties. Additionally, compromised routers could serve as footholds for lateral movement within corporate networks or be leveraged in botnet attacks affecting broader infrastructure. The remote exploitability without authentication increases the threat surface, particularly in environments where these devices are directly exposed to the internet or insufficiently segmented from critical assets.
Mitigation Recommendations
1. Immediate firmware update: Organizations and users should check for and apply any official patches or firmware updates from Tenda addressing this vulnerability. If no patch is available, consider upgrading to a newer, unaffected device model. 2. Network segmentation: Isolate Tenda i22 routers from critical internal networks to limit potential lateral movement in case of compromise. 3. Disable or restrict remote management interfaces, especially those exposed to the internet, to reduce attack vectors. 4. Implement firewall rules to block unauthorized access to the /goform/wxportalauth endpoint or related management ports. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or anomalous payloads targeting the vulnerable endpoint. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-9297. 7. Educate users and administrators about the risks and signs of router compromise to enable prompt incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-21T05:20:16.875Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a70e6cad5a09ad0010ba7f
Added to database: 8/21/2025, 12:17:48 PM
Last enriched: 8/21/2025, 12:32:54 PM
Last updated: 8/21/2025, 2:26:50 PM
Views: 4
Related Threats
CVE-2025-7221: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
MediumCVE-2025-9305: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9304: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-55297: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in espressif esp-idf
MediumCVE-2025-53251: CWE-434 Unrestricted Upload of File with Dangerous Type in An-Themes Pin WP
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.