A vulnerability was determined in Tenda O3 1.0.0.10(2478). Affected is the function SetValue/GetValue of the file /goform/setDhcpConfig. Executing manipulation of the argument dhcpEn can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda o3 Firmware1.0.0.10\(2478\)
CPEs cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:o3_firmware1.0.0.10\(2478\):*:*:*:*:*:*:*:*
Vendors & Products Tenda o3 Firmware1.0.0.10\(2478\)

Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda o3
Vendors & Products Tenda
Tenda o3

Mon, 27 Oct 2025 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda O3 1.0.0.10(2478). Affected is the function SetValue/GetValue of the file /goform/setDhcpConfig. Executing manipulation of the argument dhcpEn can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title Tenda O3 setDhcpConfig GetValue stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-28T13:48:15.487Z

Reserved: 2025-10-25T11:58:57.980Z

Link: CVE-2025-12209

cve-icon Vulnrichment

Updated: 2025-10-28T13:48:03.397Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T03:15:50.333

Modified: 2025-10-28T14:34:42.157

Link: CVE-2025-12209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-27T22:06:32Z