CVE-2025-7416

| EUVD-2025-21074 HIGH
2025-07-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21074
PoC Detected
Jul 16, 2025 - 15:00 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 22:15 nvd
HIGH 8.8

Description

A vulnerability, which was classified as critical, was found in Tenda O3V2 1.0.0.12(3880). Affected is the function fromSysToolTime of the file /goform/setSysTimeInfo of the component httpd. The manipulation of the argument Time leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

A critical stack-based buffer overflow vulnerability exists in Tenda O3V2 1.0.0.12(3880) in the httpd component's fromSysToolTime function within /goform/setSysTimeInfo. An authenticated remote attacker can exploit this by manipulating the Time argument to achieve arbitrary code execution with high confidentiality, integrity, and availability impact (CVSS 8.8). Public exploit disclosure and active exploitation indicators elevate real-world risk significantly.

Technical Context

The vulnerability resides in a network-accessible HTTP daemon (httpd) endpoint handling system time configuration. The fromSysToolTime function fails to implement proper bounds checking on user-supplied Time parameter input before copying it into a stack buffer. This is a classic CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) vulnerability enabling stack smashing attacks. The affected CPE is cpe:2.3:o:tenda:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*. The httpd component processes unauthenticated HTTP requests, but requires authenticated access (PR:L in CVSS vector), suggesting the vulnerability is exploitable post-authentication or through credential compromise.

Affected Products

Tenda O3V2 firmware version 1.0.0.12(3880) and potentially related firmware builds. CPE: cpe:2.3:o:tenda:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*. Tenda O3V2 is a wireless mesh networking device commonly deployed in residential/SOHO networks. Related O3V2 firmware versions preceding 1.0.0.12(3880) may also be vulnerable if the vulnerable fromSysToolTime function is present. Vendor advisory and patch information should be sourced from Tenda security bulletins (https://www.tenda.com.cn/ or regional support pages).

Remediation

Immediate mitigation steps: (1) If a patched firmware version is available from Tenda, apply it immediately—contact Tenda support or check their firmware download page for O3V2 builds newer than 1.0.0.12(3880); (2) Restrict network access to /goform/setSysTimeInfo endpoint via WAF, firewall rules, or disable the httpd service if not required; (3) Implement strong authentication controls to prevent unauthorized account access (limits PR:L exploitation path); (4) Segment affected O3V2 devices on isolated VLANs if they must remain operational; (5) Monitor for exploit indicators in httpd logs (malformed Time parameter submissions, buffer patterns); (6) As a last resort, replace the O3V2 device with a patched alternative if vendor remediation is unavailable. Vendor patch ETA should be requested from Tenda immediately.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

CVE-2025-7416 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy