CVE-2025-3259

A vulnerability, which was classified as critical, has been found in Tenda RX3 16.03.13.11. This issue affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c?pvs=4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.303329 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.303329 Third Party Advisory VDB Entry
https://vuldb.com/?submit.549199 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Third Party Advisory VDB Entry
https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11_multi:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*

History

07 Apr 2025, 18:19

Type Values Removed Values Added
CWE CWE-787
First Time Tenda
Tenda rx3
Tenda rx3 Firmware
CPE cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11_multi:*:*:*:*:*:*:*
References () https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c?pvs=4 - () https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c?pvs=4 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.303329 - () https://vuldb.com/?ctiid.303329 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.303329 - () https://vuldb.com/?id.303329 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.549199 - () https://vuldb.com/?submit.549199 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Third Party Advisory, VDB Entry
References () https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c - () https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c - Exploit, Third Party Advisory

07 Apr 2025, 14:17

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en Tenda RX3 16.03.13.11. Este problema afecta a la función formSetDeviceName del archivo /goform/SetOnlineDevName. La manipulación del argumento devName provoca un desbordamiento del búfer en la pila. El ataque puede iniciarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

04 Apr 2025, 19:15

Type Values Removed Values Added
References
  • () https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c -

04 Apr 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-04 18:15

Updated : 2025-04-07 18:19


NVD link : CVE-2025-3259

Mitre link : CVE-2025-3259

CVE.ORG link : CVE-2025-3259


JSON object : View

Products Affected

tenda

  • rx3
  • rx3_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write