EUVD-2025-21073

| CVE-2025-7417 HIGH
2025-07-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21073
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
PoC Detected
Jul 16, 2025 - 16:41 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 22:15 nvd
HIGH 8.8

Description

A vulnerability has been found in Tenda O3V2 1.0.0.12(3880) and classified as critical. Affected by this vulnerability is the function fromNetToolGet of the file /goform/setPingInfo of the component httpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7417 is a critical stack-based buffer overflow vulnerability in Tenda O3V2 router firmware (version 1.0.0.12(3880)) affecting the /goform/setPingInfo endpoint. An authenticated attacker can exploit improper input validation on the 'ip' parameter to achieve remote code execution with high impact on confidentiality, integrity, and availability. A public proof-of-concept exploit exists, and the vulnerability is actively exploitable in real-world environments.

Technical Context

The vulnerability exists in the httpd web service component of Tenda O3V2 routers, specifically in the fromNetToolGet function that processes ping utility requests via the /goform/setPingInfo handler. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), where user-supplied input from the 'ip' parameter is copied into a fixed-size stack buffer without proper length validation. This classic stack-based buffer overflow allows an attacker to overwrite the stack, potentially corrupting return addresses and enabling arbitrary code execution. The affected CPE is likely 'cpe:2.3:o:tenda:o3v2_firmware:1.0.0.12(3880):*:*:*:*:*:*:*'. The vulnerability resides in network-accessible HTTP handling code that processes what appears to be a network diagnostics feature (ping functionality).

Affected Products

O3V2 (['1.0.0.12(3880)'])

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

EUVD-2025-21073 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy