CVE-2025-3820

A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644) and classified as critical. Affected by this issue is the function cgiSysUplinkCheckSet of the file /bin/httpd. The manipulation of the argument hostIp1/hostIp2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/02Tn/vul/issues/4 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.305726 Permissions Required VDB Entry
https://vuldb.com/?id.305726 Third Party Advisory VDB Entry
https://vuldb.com/?submit.555728 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w12_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tenda:w12_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tenda:i24_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tenda:i24_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*

History

30 Jul 2025, 18:57

Type Values Removed Values Added
CPE cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w12_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:o:tenda:i24_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w12_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:o:tenda:i24_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
First Time Tenda w12
Tenda w12 Firmware
Tenda i24
Tenda i24 Firmware
Tenda
Summary
  • (es) Se encontró una vulnerabilidad en Tenda W12 e i24 3.0.0.4(2887)/3.0.0.5(3644), clasificada como crítica. Este problema afecta a la función cgiSysUplinkCheckSet del archivo /bin/httpd. La manipulación del argumento hostIp1/hostIp2 provoca un desbordamiento del búfer basado en la pila. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.
References () https://github.com/02Tn/vul/issues/4 - () https://github.com/02Tn/vul/issues/4 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.305726 - () https://vuldb.com/?ctiid.305726 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.305726 - () https://vuldb.com/?id.305726 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.555728 - () https://vuldb.com/?submit.555728 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

19 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-19 21:15

Updated : 2025-07-30 18:57


NVD link : CVE-2025-3820

Mitre link : CVE-2025-3820

CVE.ORG link : CVE-2025-3820


JSON object : View

Products Affected

tenda

  • i24
  • w12_firmware
  • i24_firmware
  • w12
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow