CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm function via the funcname, funcpara1, and funcpara2 parameters.
Analysis
Buffer overflow in Tenda AC6 router firmware version 15.03.05.16_multi enables unauthenticated remote denial-of-service attacks via crafted HTTP requests to formSetCfm function. Attackers can trigger service disruption by sending malicious funcname, funcpara1, or funcpara2 parameters without authentication. The network-accessible attack vector with low complexity makes this exploitable from the internet. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).
Technical Context
CWE-120 buffer overflow in formSetCfm function results from inadequate input validation on three HTTP parameters. Network-reachable web interface accepts oversized parameter strings, causing stack or heap corruption that terminates service availability. CVSS vector PR:N confirms unauthenticated attack surface directly exposed to WAN/LAN requests.
Affected Products
Tenda AC6 wireless router, version 15.03.05.16_multi. CPE data incomplete in source intelligence; vendor Tenda Technologies confirmed through product identification.
Remediation
No vendor-released patch identified at time of analysis. Tenda has not published security advisory or firmware update addressing CVE-2025-52221 for AC6 15.03.05.16_multi. Users should monitor Tenda official support portal for firmware releases. Immediate mitigations: disable remote administration interface, restrict web management access to trusted internal IP ranges via firewall rules, place device behind network segmentation boundaries. Consider hardware replacement if vendor discontinues AC6 support. Technical analysis available at https://github.com/faqiadegege/IoTVuln/blob/main/tendaAc6_formSetCfm_funcname_overflow/detail.md and NVD advisory https://nvd.nist.gov/vuln/detail/CVE-2025-52221 for monitoring patch availability.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209313