ID

VAR-202502-2320


CVE

CVE-2025-25507


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Code injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-003483

DESCRIPTION

There is a RCE vulnerability in Tenda AC6 15.03.05.16_multi. In the formexeCommand function, the parameter cmdinput will cause remote command execution. of AC6 A code injection vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Tenda AC6 has a code execution vulnerability, which is caused by the cmdinput parameter of the formexeCommand function failing to properly filter special elements in the constructed code segment. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2025-25507 // JVNDB: JVNDB-2025-003483 // CNVD: CNVD-2025-09224

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-09224

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.05.16_multi

Trust: 1.0

vendor:tendamodel:ac6scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion:ac6 firmware 15.03.05.16 multi

Trust: 0.8

vendor:tendamodel:ac6scope: - version: -

Trust: 0.8

vendor:tendamodel:ac6 15.03.05.16 multiscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-09224 // JVNDB: JVNDB-2025-003483 // NVD: CVE-2025-25507

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-25507
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-003483
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-09224
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-09224
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-25507
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-003483
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-09224 // JVNDB: JVNDB-2025-003483 // NVD: CVE-2025-25507

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.0

problemtype:Code injection (CWE-94) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-003483 // NVD: CVE-2025-25507

EXTERNAL IDS

db:NVDid:CVE-2025-25507

Trust: 3.2

db:JVNDBid:JVNDB-2025-003483

Trust: 0.8

db:CNVDid:CNVD-2025-09224

Trust: 0.6

sources: CNVD: CNVD-2025-09224 // JVNDB: JVNDB-2025-003483 // NVD: CVE-2025-25507

REFERENCES

url:https://github.com/faqiadegege/iotvuln/blob/main/tendaac6_formexecommand_cmdinput_rce/detail.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-25507

Trust: 1.4

sources: CNVD: CNVD-2025-09224 // JVNDB: JVNDB-2025-003483 // NVD: CVE-2025-25507

SOURCES

db:CNVDid:CNVD-2025-09224
db:JVNDBid:JVNDB-2025-003483
db:NVDid:CVE-2025-25507

LAST UPDATE DATE

2025-05-09T23:18:43.926000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-09224date:2025-05-08T00:00:00
db:JVNDBid:JVNDB-2025-003483date:2025-04-16T01:41:00
db:NVDid:CVE-2025-25507date:2025-04-10T13:37:05.443

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-09224date:2025-04-30T00:00:00
db:JVNDBid:JVNDB-2025-003483date:2025-04-16T00:00:00
db:NVDid:CVE-2025-25507date:2025-02-21T17:15:14.453