ID

VAR-202503-2831


CVE

CVE-2025-29100


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC8  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-002872

DESCRIPTION

Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the fromSetRouteStatic function via the parameter list. Shenzhen Tenda Technology Co.,Ltd. of AC8 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. AC8 is a wireless router. AC8 has a buffer overflow vulnerability. The vulnerability is caused by the SetRouteStatic function failing to correctly verify the length of the input data. Attackers can use this vulnerability to execute arbitrary code on the system

Trust: 2.16

sources: NVD: CVE-2025-29100 // JVNDB: JVNDB-2025-002872 // CNVD: CNVD-2025-07592

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-07592

AFFECTED PRODUCTS

vendor:tendamodel:ac8scope:eqversion:16.03.34.06

Trust: 1.0

vendor:tendamodel:ac8scope: - version: -

Trust: 0.8

vendor:tendamodel:ac8scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac8scope:eqversion:ac8 firmware 16.03.34.06

Trust: 0.8

vendor:jixiang tengdamodel:ac8scope:eqversion:v16.03.34.06

Trust: 0.6

sources: CNVD: CNVD-2025-07592 // JVNDB: JVNDB-2025-002872 // NVD: CVE-2025-29100

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29100
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-002872
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-07592
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-07592
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29100
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-002872
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-07592 // JVNDB: JVNDB-2025-002872 // NVD: CVE-2025-29100

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-002872 // NVD: CVE-2025-29100

EXTERNAL IDS

db:NVDid:CVE-2025-29100

Trust: 3.2

db:JVNDBid:JVNDB-2025-002872

Trust: 0.8

db:CNVDid:CNVD-2025-07592

Trust: 0.6

sources: CNVD: CNVD-2025-07592 // JVNDB: JVNDB-2025-002872 // NVD: CVE-2025-29100

REFERENCES

url:https://gist.github.com/raining-101/b2bd27d16cdca94d330150a8ead9caa8

Trust: 1.8

url:https://github.com/raining-101/iot_cve/blob/main/tenda%20a8%20v16.03.34.06%20fromsetroutestatic_stack_overflow.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-29100

Trust: 1.4

sources: CNVD: CNVD-2025-07592 // JVNDB: JVNDB-2025-002872 // NVD: CVE-2025-29100

SOURCES

db:CNVDid:CNVD-2025-07592
db:JVNDBid:JVNDB-2025-002872
db:NVDid:CVE-2025-29100

LAST UPDATE DATE

2025-04-20T23:15:32.371000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-07592date:2025-04-18T00:00:00
db:JVNDBid:JVNDB-2025-002872date:2025-04-03T01:30:00
db:NVDid:CVE-2025-29100date:2025-04-01T20:06:53.017

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-07592date:2025-04-11T00:00:00
db:JVNDBid:JVNDB-2025-002872date:2025-04-03T00:00:00
db:NVDid:CVE-2025-29100date:2025-03-24T21:15:17.673