ID

VAR-202503-2686


CVE

CVE-2025-29149


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  I12  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-002653

DESCRIPTION

Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the ping1 parameter in the formSetAutoPing function. Shenzhen Tenda Technology Co.,Ltd. of I12 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda i12 is a ceiling-mounted wireless access point from China's Tenda Company. The vulnerability is caused by the ping1 parameter in the formSetAutoPing function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-29149 // JVNDB: JVNDB-2025-002653 // CNVD: CNVD-2025-08309

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-08309

AFFECTED PRODUCTS

vendor:tendamodel:i12scope:eqversion:1.0.0.10\(3805\)

Trust: 1.0

vendor:tendamodel:i12scope: - version: -

Trust: 0.8

vendor:tendamodel:i12scope:eqversion:i12 firmware 1.0.0.10(3805)

Trust: 0.8

vendor:tendamodel:i12scope:eqversion: -

Trust: 0.8

vendor:tendamodel:i12scope:eqversion:v1.0.0.10(3805)

Trust: 0.6

sources: CNVD: CNVD-2025-08309 // JVNDB: JVNDB-2025-002653 // NVD: CVE-2025-29149

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29149
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-002653
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-08309
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-08309
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29149
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-002653
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-08309 // JVNDB: JVNDB-2025-002653 // NVD: CVE-2025-29149

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-002653 // NVD: CVE-2025-29149

EXTERNAL IDS

db:NVDid:CVE-2025-29149

Trust: 3.2

db:JVNDBid:JVNDB-2025-002653

Trust: 0.8

db:CNVDid:CNVD-2025-08309

Trust: 0.6

sources: CNVD: CNVD-2025-08309 // JVNDB: JVNDB-2025-002653 // NVD: CVE-2025-29149

REFERENCES

url:https://github.com/raining-101/iot_cve/blob/main/tenda%20i12formsetautoping_ping1.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-29149

Trust: 1.4

sources: CNVD: CNVD-2025-08309 // JVNDB: JVNDB-2025-002653 // NVD: CVE-2025-29149

SOURCES

db:CNVDid:CNVD-2025-08309
db:JVNDBid:JVNDB-2025-002653
db:NVDid:CVE-2025-29149

LAST UPDATE DATE

2025-04-26T22:56:55.427000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-08309date:2025-04-25T00:00:00
db:JVNDBid:JVNDB-2025-002653date:2025-03-27T04:43:00
db:NVDid:CVE-2025-29149date:2025-03-27T15:26:02.940

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-08309date:2025-04-18T00:00:00
db:JVNDBid:JVNDB-2025-002653date:2025-03-27T00:00:00
db:NVDid:CVE-2025-29149date:2025-03-20T17:15:38.383