CVE-2025-5527

| EUVD-2025-16791 HIGH
2025-06-03 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2025-16791
PoC Detected
Jun 09, 2025 - 15:11 vuln.today
Public exploit code
CVE Published
Jun 03, 2025 - 21:15 nvd
HIGH 8.8

Description

A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01. It has been rated as critical. This issue affects the function save_staticroute_data of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical stack-based buffer overflow vulnerability in Tenda RX3 router firmware version 16.03.13.11_multi_TDE01, affecting the static route configuration endpoint. An authenticated remote attacker can exploit this vulnerability through manipulation of the 'list' argument in /goform/SetStaticRouteCfg to achieve code execution with full system privileges (confidentiality, integrity, and availability impact). Public exploit code exists and the vulnerability has been disclosed, creating immediate exploitation risk despite requiring authenticated access.

Technical Context

The vulnerability exists in the save_staticroute_data function within the Tenda RX3 web management interface (/goform/SetStaticRouteCfg endpoint). It is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic stack-based buffer overflow. The affected product is CPE: cpe:2.3:o:tenda:rx3_firmware:16.03.13.11_multi_tde01:*:*:*:*:*:*:* (Tenda RX3 router running firmware version 16.03.13.11_multi_TDE01). The vulnerability stems from insufficient input validation on the 'list' parameter when processing static route configuration data, allowing an attacker to write beyond allocated buffer boundaries on the stack, potentially overwriting return addresses or other critical data structures.

Affected Products

RX3 (16.03.13.11_multi_TDE01)

Remediation

Immediate actions: (1) Check Tenda's official security advisory at https://www.tenda.com.cn for patched firmware versions beyond 16.03.13.11_multi_TDE01; (2) If patched firmware is available, upgrade RX3 devices through the web UI (System Tools > Firmware Upgrade) or download from Tenda's support portal; (3) Temporary mitigation (if patching unavailable): Restrict access to the router's web management interface using firewall rules, disable remote management if enabled, and enforce strong authentication credentials to reduce attack surface. (4) Monitor for signs of compromise (unexpected routing table changes, unusual traffic patterns, system crashes). Vendor patch status and timeline were not provided in the available intelligence; immediate contact with Tenda support is recommended to obtain patched firmware.

Priority Score

65
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +44
POC: +20

Share

CVE-2025-5527 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy