ID

VAR-202506-0835


CVE

CVE-2025-6113


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  fh1203  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007283

DESCRIPTION

A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. Affected is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of fh1203 The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the parameter lanMask of the fromadvsetlanip function in the file /goform/AdvSetLanip failing to correctly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack

Trust: 2.16

sources: NVD: CVE-2025-6113 // JVNDB: JVNDB-2025-007283 // CNVD: CNVD-2025-13427

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13427

AFFECTED PRODUCTS

vendor:tendamodel:fh1203scope:eqversion:2.0.1.6

Trust: 1.6

vendor:tendamodel:fh1203scope:eqversion:fh1203 firmware 2.0.1.6

Trust: 0.8

vendor:tendamodel:fh1203scope:eqversion: -

Trust: 0.8

vendor:tendamodel:fh1203scope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2025-13427 // JVNDB: JVNDB-2025-007283 // NVD: CVE-2025-6113

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-6113
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-007283
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-13427
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-6113
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-007283
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-13427
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-6113
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-007283
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13427 // JVNDB: JVNDB-2025-007283 // NVD: CVE-2025-6113

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007283 // NVD: CVE-2025-6113

EXTERNAL IDS

db:NVDid:CVE-2025-6113

Trust: 3.2

db:VULDBid:312582

Trust: 1.8

db:JVNDBid:JVNDB-2025-007283

Trust: 0.8

db:CNVDid:CNVD-2025-13427

Trust: 0.6

sources: CNVD: CNVD-2025-13427 // JVNDB: JVNDB-2025-007283 // NVD: CVE-2025-6113

REFERENCES

url:https://lavender-bicycle-a5a.notion.site/tenda-fh1203-fromadvsetlanip-20b53a41781f8070bc65ffadd1ed6bf1?source=copy_link

Trust: 1.8

url:https://vuldb.com/?id.312582

Trust: 1.8

url:https://vuldb.com/?submit.592478

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-6113

Trust: 1.4

url:https://vuldb.com/?ctiid.312582

Trust: 1.0

sources: CNVD: CNVD-2025-13427 // JVNDB: JVNDB-2025-007283 // NVD: CVE-2025-6113

SOURCES

db:CNVDid:CNVD-2025-13427
db:JVNDBid:JVNDB-2025-007283
db:NVDid:CVE-2025-6113

LAST UPDATE DATE

2025-06-26T19:34:19.587000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13427date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2025-007283date:2025-06-19T07:11:00
db:NVDid:CVE-2025-6113date:2025-06-17T19:38:13.637

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13427date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2025-007283date:2025-06-19T00:00:00
db:NVDid:CVE-2025-6113date:2025-06-16T08:15:20.227