ID

VAR-202509-1120


CVE

CVE-2025-57059


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  G3  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-013991

DESCRIPTION

Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the dhcpIndex parameter in the addDhcpRule function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the failure of the addDhcpRule function to properly validate the length of the input data in the dhcpIndex parameter

Trust: 2.16

sources: NVD: CVE-2025-57059 // JVNDB: JVNDB-2025-013991 // CNVD: CNVD-2025-21161

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-21161

AFFECTED PRODUCTS

vendor:tendamodel:g3scope:lteversion:15.11.0.17\(9502\)

Trust: 1.0

vendor:tendamodel:g3scope:eqversion: -

Trust: 0.8

vendor:tendamodel:g3scope:lteversion:g3 firmware 15.11.0.17(9502) and earlier

Trust: 0.8

vendor:tendamodel:g3scope: - version: -

Trust: 0.8

vendor:tendamodel:g3 v3.0br v15.11.0.17scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-21161 // JVNDB: JVNDB-2025-013991 // NVD: CVE-2025-57059

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-57059
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-013991
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-21161
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-21161
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-57059
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-013991
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-21161 // JVNDB: JVNDB-2025-013991 // NVD: CVE-2025-57059

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-013991 // NVD: CVE-2025-57059

EXTERNAL IDS

db:NVDid:CVE-2025-57059

Trust: 3.2

db:JVNDBid:JVNDB-2025-013991

Trust: 0.8

db:CNVDid:CNVD-2025-21161

Trust: 0.6

sources: CNVD: CNVD-2025-21161 // JVNDB: JVNDB-2025-013991 // NVD: CVE-2025-57059

REFERENCES

url:https://github.com/vulndetailrecord/vulfordevice/blob/main/tenda/g3/adddhcprule.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-57059

Trust: 1.4

sources: CNVD: CNVD-2025-21161 // JVNDB: JVNDB-2025-013991 // NVD: CVE-2025-57059

SOURCES

db:CNVDid:CNVD-2025-21161
db:JVNDBid:JVNDB-2025-013991
db:NVDid:CVE-2025-57059

LAST UPDATE DATE

2025-09-19T23:11:19.058000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-21161date:2025-09-12T00:00:00
db:JVNDBid:JVNDB-2025-013991date:2025-09-17T05:26:00
db:NVDid:CVE-2025-57059date:2025-09-15T18:14:18.027

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-21161date:2025-09-12T00:00:00
db:JVNDBid:JVNDB-2025-013991date:2025-09-17T00:00:00
db:NVDid:CVE-2025-57059date:2025-09-09T17:16:08.390