CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability has been found in Tenda O3V2 1.0.0.12(3880) and classified as critical. Affected by this vulnerability is the function fromNetToolGet of the file /goform/setPingInfo of the component httpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7417 is a critical stack-based buffer overflow vulnerability in Tenda O3V2 router firmware (version 1.0.0.12(3880)) affecting the /goform/setPingInfo endpoint. An authenticated attacker can exploit improper input validation on the 'ip' parameter to achieve remote code execution with high impact on confidentiality, integrity, and availability. A public proof-of-concept exploit exists, and the vulnerability is actively exploitable in real-world environments.
Technical Context
The vulnerability exists in the httpd web service component of Tenda O3V2 routers, specifically in the fromNetToolGet function that processes ping utility requests via the /goform/setPingInfo handler. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), where user-supplied input from the 'ip' parameter is copied into a fixed-size stack buffer without proper length validation. This classic stack-based buffer overflow allows an attacker to overwrite the stack, potentially corrupting return addresses and enabling arbitrary code execution. The affected CPE is likely 'cpe:2.3:o:tenda:o3v2_firmware:1.0.0.12(3880):*:*:*:*:*:*:*'. The vulnerability resides in network-accessible HTTP handling code that processes what appears to be a network diagnostics feature (ping functionality).
Affected Products
O3V2 (['1.0.0.12(3880)'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21073