CVE-2025-52221

| EUVD-2025-209313 HIGH
2026-04-08 mitre
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Apr 08, 2026 - 18:16 euvd
EUVD-2025-209313
Analysis Generated
Apr 08, 2026 - 18:16 vuln.today
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm function via the funcname, funcpara1, and funcpara2 parameters.

Analysis

Buffer overflow in Tenda AC6 router firmware version 15.03.05.16_multi enables unauthenticated remote denial-of-service attacks via crafted HTTP requests to formSetCfm function. Attackers can trigger service disruption by sending malicious funcname, funcpara1, or funcpara2 parameters without authentication. The network-accessible attack vector with low complexity makes this exploitable from the internet. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).

Technical Context

CWE-120 buffer overflow in formSetCfm function results from inadequate input validation on three HTTP parameters. Network-reachable web interface accepts oversized parameter strings, causing stack or heap corruption that terminates service availability. CVSS vector PR:N confirms unauthenticated attack surface directly exposed to WAN/LAN requests.

Affected Products

Tenda AC6 wireless router, version 15.03.05.16_multi. CPE data incomplete in source intelligence; vendor Tenda Technologies confirmed through product identification.

Remediation

No vendor-released patch identified at time of analysis. Tenda has not published security advisory or firmware update addressing CVE-2025-52221 for AC6 15.03.05.16_multi. Users should monitor Tenda official support portal for firmware releases. Immediate mitigations: disable remote administration interface, restrict web management access to trusted internal IP ranges via firewall rules, place device behind network segmentation boundaries. Consider hardware replacement if vendor discontinues AC6 support. Technical analysis available at https://github.com/faqiadegege/IoTVuln/blob/main/tendaAc6_formSetCfm_funcname_overflow/detail.md and NVD advisory https://nvd.nist.gov/vuln/detail/CVE-2025-52221 for monitoring patch availability.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-52221 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy