ID

VAR-202603-1357


CVE

CVE-2025-70252


TITLE

Shenzhen Tenda Technology Co.,Ltd. of AC6  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283

DESCRIPTION

An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_multi. The index and mode are controllable. If the conditions are met to sprintf, they will be spliced into tmp. It is worth noting that there is no size check,which leads to a stack overflow vulnerability. sprintf When the conditions are met, these tmp Notably, there is no size check, which creates a stack overflow vulnerability.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-70252 // JVNDB: JVNDB-2026-006283

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.06.23_multi

Trust: 1.0

vendor:tendamodel:ac6scope:eqversion:ac6 firmware 15.03.06.23_multi

Trust: 0.8

vendor:tendamodel:ac6scope: - version: -

Trust: 0.8

vendor:tendamodel:ac6scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283 // NVD: CVE-2025-70252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2025-70252
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-70252
value: HIGH

Trust: 1.0

NVD: CVE-2025-70252
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2025-70252
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2025-70252
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283 // NVD: CVE-2025-70252 // NVD: CVE-2025-70252

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283 // NVD: CVE-2025-70252

PATCH

title:CVEreport/D-link/CVE-2025-70252 at main  akuma-QAQ/CVEreport  GitHuburl:https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70252

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283

EXTERNAL IDS

db:NVDid:CVE-2025-70252

Trust: 2.6

db:JVNDBid:JVNDB-2026-006283

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283 // NVD: CVE-2025-70252

REFERENCES

url:https://www.tenda.com.cn/material/show/2855

Trust: 1.8

url:https://github.com/akuma-qaq/cvereport/tree/main/d-link/cve-2025-70252

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-70252

Trust: 0.8

sources: JVNDB: JVNDB-2026-006283 // NVD: CVE-2025-70252

SOURCES

db:JVNDBid:JVNDB-2026-006283
db:NVDid:CVE-2025-70252

LAST UPDATE DATE

2026-03-13T23:27:04.062000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-006283date:2026-03-09T03:06:00
db:NVDid:CVE-2025-70252date:2026-03-06T21:04:07.437

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-006283date:2026-03-09T00:00:00
db:NVDid:CVE-2025-70252date:2026-03-02T17:16:28.783