CVE-2025-7423

A vulnerability classified as critical was found in Tenda O3V2 1.0.0.12(3880). Affected by this vulnerability is the function formWifiMacFilterSet of the file /goform/setWrlFilterList of the component httpd. The manipulation of the argument macList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*

History

16 Jul 2025, 16:43

Type Values Removed Values Added
First Time Tenda o3 Firmware
Tenda
Tenda o3
CPE cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:o3_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:*
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
References () https://vuldb.com/?id.315883 - () https://vuldb.com/?id.315883 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.608869 - () https://vuldb.com/?submit.608869 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.315883 - () https://vuldb.com/?ctiid.315883 - Permissions Required
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_56/56.md - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_56/56.md - Exploit, Third Party Advisory
References () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_56/56.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_56/56.md#poc - Exploit, Third Party Advisory

11 Jul 2025, 14:15

Type Values Removed Values Added
CWE CWE-121
CWE-119
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : unknown

11 Jul 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-11 01:15

Updated : 2025-07-16 16:43


NVD link : CVE-2025-7423

Mitre link : CVE-2025-7423


JSON object : View

Products Affected

tenda

  • o3
  • o3_firmware
CWE

No CWE.