ID

VAR-202501-0096


CVE

CVE-2025-0349


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-002150

DESCRIPTION

A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. Shenzhen Tenda Technology Co.,Ltd. of AC6 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC6 has a buffer overflow vulnerability, which is caused by a boundary error in the parameter src when processing untrusted input. An attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-0349 // JVNDB: JVNDB-2025-002150 // CNVD: CNVD-2025-09942

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-09942

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.05.16

Trust: 1.6

vendor:tendamodel:ac6scope: - version: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion:ac6 firmware 15.03.05.16

Trust: 0.8

sources: CNVD: CNVD-2025-09942 // JVNDB: JVNDB-2025-002150 // NVD: CVE-2025-0349

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-0349
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-0349
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-002150
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-09942
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-0349
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-002150
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-09942
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-0349
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-0349
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-002150
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-09942 // JVNDB: JVNDB-2025-002150 // NVD: CVE-2025-0349 // NVD: CVE-2025-0349

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-002150 // NVD: CVE-2025-0349

PATCH

title:Patch for Tenda AC6 Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/687871

Trust: 0.6

sources: CNVD: CNVD-2025-09942

EXTERNAL IDS

db:NVDid:CVE-2025-0349

Trust: 3.2

db:VULDBid:290862

Trust: 1.8

db:JVNDBid:JVNDB-2025-002150

Trust: 0.8

db:CNVDid:CNVD-2025-09942

Trust: 0.6

sources: CNVD: CNVD-2025-09942 // JVNDB: JVNDB-2025-002150 // NVD: CVE-2025-0349

REFERENCES

url:https://github.com/wy876/cve/issues/5

Trust: 1.8

url:https://vuldb.com/?id.290862

Trust: 1.8

url:https://vuldb.com/?submit.477048

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-0349

Trust: 1.4

url:https://vuldb.com/?ctiid.290862

Trust: 1.0

sources: CNVD: CNVD-2025-09942 // JVNDB: JVNDB-2025-002150 // NVD: CVE-2025-0349

SOURCES

db:CNVDid:CNVD-2025-09942
db:JVNDBid:JVNDB-2025-002150
db:NVDid:CVE-2025-0349

LAST UPDATE DATE

2025-05-17T23:17:30.415000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-09942date:2025-05-16T00:00:00
db:JVNDBid:JVNDB-2025-002150date:2025-03-07T06:16:00
db:NVDid:CVE-2025-0349date:2025-03-22T09:15:14.137

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-09942date:2025-05-14T00:00:00
db:JVNDBid:JVNDB-2025-002150date:2025-03-07T00:00:00
db:NVDid:CVE-2025-0349date:2025-01-09T11:15:16.547