CVE-2025-4007

A vulnerability classified as critical was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). Affected by this vulnerability is the function cgidhcpsCfgSet of the file /goform/modules of the component httpd. The manipulation of the argument json leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/02Tn/vul/issues/5 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.306343 Permissions Required VDB Entry
https://vuldb.com/?id.306343 Third Party Advisory VDB Entry
https://vuldb.com/?submit.558165 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w12_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tenda:w12_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tenda:i24_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tenda:i24_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*

History

30 Jul 2025, 18:57

Type Values Removed Values Added
References () https://github.com/02Tn/vul/issues/5 - () https://github.com/02Tn/vul/issues/5 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.306343 - () https://vuldb.com/?ctiid.306343 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.306343 - () https://vuldb.com/?id.306343 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.558165 - () https://vuldb.com/?submit.558165 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda w12
Tenda w12 Firmware
Tenda i24
Tenda i24 Firmware
Tenda
CPE cpe:2.3:h:tenda:i24:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w12_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:o:tenda:i24_firmware:3.0.0.5\(3644\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w12:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w12_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*
cpe:2.3:o:tenda:i24_firmware:3.0.0.4\(2887\):*:*:*:*:*:*:*

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad clasificada como crítica en Tenda W12 e i24 3.0.0.4(2887)/3.0.0.5(3644). Esta vulnerabilidad afecta a la función cgidhcpsCfgSet del archivo /goform/modules del componente httpd. La manipulación del argumento json provoca un desbordamiento del búfer basado en la pila. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

28 Apr 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-28 08:15

Updated : 2025-07-30 18:57


NVD link : CVE-2025-4007

Mitre link : CVE-2025-4007

CVE.ORG link : CVE-2025-4007


JSON object : View

Products Affected

tenda

  • i24
  • w12_firmware
  • i24_firmware
  • w12
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow