CVE-2025-7417

A vulnerability has been found in Tenda O3V2 1.0.0.12(3880) and classified as critical. Affected by this vulnerability is the function fromNetToolGet of the file /goform/setPingInfo of the component httpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md Exploit Third Party Advisory
https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_50/50.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.315877 Permissions Required VDB Entry
https://vuldb.com/?id.315877 Third Party Advisory VDB Entry
https://vuldb.com/?submit.608863 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*

History

16 Jul 2025, 16:41

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 22:15

Updated : 2025-07-16 16:41


NVD link : CVE-2025-7417

Mitre link : CVE-2025-7417

CVE.ORG link : CVE-2025-7417


JSON object : View

Products Affected

tenda

  • o3_firmware
  • o3
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow