CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-3161: Tenda AC10 ShutdownSetAdd stack-based overflow

8.7 CVSS

Description

A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. This issue affects the function ShutdownSetAdd of the file /goform/ShutdownSetAdd. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Eine kritische Schwachstelle wurde in Tenda AC10 16.03.10.13 gefunden. Dies betrifft die Funktion ShutdownSetAdd der Datei /goform/ShutdownSetAdd. Mit der Manipulation des Arguments list mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-3161

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem Types

Stack-based Buffer Overflow Memory Corruption

Affected Products

Vendor: Tenda

Product: AC10

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 19.2% (scored less or equal to compared to others)

EPSS Date: 2025-05-02 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3161
https://vuldb.com/?id.303107
https://vuldb.com/?ctiid.303107
https://vuldb.com/?submit.542437
https://github.com/LxxxtSec/CVE/blob/main/CVE_1.md
https://github.com/LxxxtSec/CVE/blob/main/CVE_1.md#vulnerability-proof-supplement-remote-code-execution-rce
https://pan.baidu.com/s/1_zhGlS0fFhz0Pkh8svljjA?pwd=viwq
https://www.tenda.com.cn/

Timeline