ID

VAR-202507-0239


CVE

CVE-2025-50258


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC6  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-008195

DESCRIPTION

Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the SetSysTimeCfg function via the time parameter. Shenzhen Tenda Technology Co.,Ltd. of AC6 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the time parameter in the SetSysTimeCfg function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2025-50258 // JVNDB: JVNDB-2025-008195 // CNVD: CNVD-2025-15720

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-15720

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.05.16_multi

Trust: 1.0

vendor:tendamodel:ac6scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac6scope: - version: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion:ac6 firmware 15.03.05.16 multi

Trust: 0.8

vendor:tendamodel:ac6 15.03.05.16 multiscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-15720 // JVNDB: JVNDB-2025-008195 // NVD: CVE-2025-50258

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-50258
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-008195
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-15720
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-15720
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-50258
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-008195
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-15720 // JVNDB: JVNDB-2025-008195 // NVD: CVE-2025-50258

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-008195 // NVD: CVE-2025-50258

PATCH

title:Patch for Tenda AC6 SetSysTimeCfg function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/709071

Trust: 0.6

sources: CNVD: CNVD-2025-15720

EXTERNAL IDS

db:NVDid:CVE-2025-50258

Trust: 3.2

db:JVNDBid:JVNDB-2025-008195

Trust: 0.8

db:CNVDid:CNVD-2025-15720

Trust: 0.6

sources: CNVD: CNVD-2025-15720 // JVNDB: JVNDB-2025-008195 // NVD: CVE-2025-50258

REFERENCES

url:https://github.com/faqiadegege/iotvuln/blob/main/tendaac6_setsystimecfg_timeoverflow/detail.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2025-50258

Trust: 0.8

sources: CNVD: CNVD-2025-15720 // JVNDB: JVNDB-2025-008195 // NVD: CVE-2025-50258

SOURCES

db:CNVDid:CNVD-2025-15720
db:JVNDBid:JVNDB-2025-008195
db:NVDid:CVE-2025-50258

LAST UPDATE DATE

2025-07-17T23:43:35.853000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-15720date:2025-07-15T00:00:00
db:JVNDBid:JVNDB-2025-008195date:2025-07-08T09:17:00
db:NVDid:CVE-2025-50258date:2025-07-07T14:40:56.783

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-15720date:2025-07-15T00:00:00
db:JVNDBid:JVNDB-2025-008195date:2025-07-08T00:00:00
db:NVDid:CVE-2025-50258date:2025-07-03T14:15:30.877