CVE-2025-7420

A vulnerability was found in Tenda O3V2 1.0.0.12(3880). It has been declared as critical. This vulnerability affects the function formWifiBasicSet of the file /goform/setWrlBasicInfo of the component httpd. The manipulation of the argument extChannel leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*

History

16 Jul 2025, 16:40

Type Values Removed Values Added
First Time Tenda o3
Tenda
Tenda o3 Firmware
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md - Exploit, Third Party Advisory
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.315880 - () https://vuldb.com/?ctiid.315880 - Permissions Required
References () https://vuldb.com/?id.315880 - () https://vuldb.com/?id.315880 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.608866 - () https://vuldb.com/?submit.608866 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
CPE cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*

11 Jul 2025, 14:15

Type Values Removed Values Added
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md -
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_53/53.md#poc -
Summary
  • (es) Se encontró una vulnerabilidad en Tenda O3V2 1.0.0.12(3880). Se ha declarado crítica. Esta vulnerabilidad afecta a la función formWifiBasicSet del archivo /goform/setWrlBasicInfo del componente httpd. La manipulación del argumento extChannel provoca un desbordamiento del búfer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

11 Jul 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-11 00:15

Updated : 2025-07-16 16:40


NVD link : CVE-2025-7420

Mitre link : CVE-2025-7420

CVE.ORG link : CVE-2025-7420


JSON object : View

Products Affected

tenda

  • o3
  • o3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow