ID

VAR-202510-0313


CVE

CVE-2025-11550


TITLE

Tenda W12 NullPointer Dereference Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-28847

DESCRIPTION

A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used. The Tenda W12 is a dual-band gigabit wireless panel access point (AP) launched by Tenda Technology, designed for scenarios such as hotels, villas, and large apartments. It supports the IEEE 802.11ac protocol and Wave2 standard, and boasts a dual-band concurrent speed of 1167Mbps. Detailed vulnerability information is currently unavailable

Trust: 1.44

sources: NVD: CVE-2025-11550 // CNVD: CNVD-2025-28847

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-28847

AFFECTED PRODUCTS

vendor:tendamodel:w12scope:eqversion:3.0.0.6\(3948\)

Trust: 1.0

vendor:tendamodel:w12scope:eqversion:3.0.0.6(3948)

Trust: 0.6

sources: CNVD: CNVD-2025-28847 // NVD: CVE-2025-11550

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11550
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2025-28847
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-11550
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-28847
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11550
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-28847 // NVD: CVE-2025-11550

PROBLEMTYPE DATA

problemtype:CWE-404

Trust: 1.0

problemtype:CWE-476

Trust: 1.0

sources: NVD: CVE-2025-11550

EXTERNAL IDS

db:NVDid:CVE-2025-11550

Trust: 1.6

db:VULDBid:327709

Trust: 1.0

db:CNVDid:CNVD-2025-28847

Trust: 0.6

sources: CNVD: CNVD-2025-28847 // NVD: CVE-2025-11550

REFERENCES

url:https://github.com/z472421519/binaryaudit/blob/main/poc/npd/tenda_w12/cgiwifischeduledset/cgiwifischeduledset.md

Trust: 1.6

url:https://vuldb.com/?submit.670118

Trust: 1.0

url:https://www.tenda.com.cn/

Trust: 1.0

url:https://vuldb.com/?id.327709

Trust: 1.0

url:https://vuldb.com/?ctiid.327709

Trust: 1.0

sources: CNVD: CNVD-2025-28847 // NVD: CVE-2025-11550

SOURCES

db:CNVDid:CNVD-2025-28847
db:NVDid:CVE-2025-11550

LAST UPDATE DATE

2025-11-22T23:35:09.921000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-28847date:2025-11-20T00:00:00
db:NVDid:CVE-2025-11550date:2025-10-20T20:42:34.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-28847date:2025-11-19T00:00:00
db:NVDid:CVE-2025-11550date:2025-10-09T18:15:48.610