Cyber Posture

CVE-2025-25676

Critical

Published: 20 February 2025

Published
20 February 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25676 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda I12 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly addressing the buffer overflow by applying firmware patches or updates to eliminate the vulnerability in formwrlSSIDset.

prevent

SI-10 mandates information input validation, preventing the buffer overflow by ensuring the 'list' parameter is checked for length and format before processing.

prevent

SI-16 provides memory protections such as ASLR and DEP, mitigating arbitrary code execution even if the buffer overflow in the 'list' parameter succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The remote unauthenticated buffer overflow in the router's public-facing web interface (formwrlSSIDset) directly enables exploitation via T1190 to achieve arbitrary code execution and full device control.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.

Deeper analysisAI

CVE-2025-25676 is a buffer overflow vulnerability (CWE-120) affecting the Tenda i12 router running firmware version V1.0.0.10(3805). The issue resides in the formwrlSSIDset function, where the list parameter triggers the overflow. It received a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

A remote, unauthenticated attacker can exploit this vulnerability over the network by sending a specially crafted request targeting the vulnerable parameter. Successful exploitation could allow arbitrary code execution, potentially granting full control over the affected device, including data theft, modification of configurations, or use as a pivot for further network compromise.

Details on exploitation and potential mitigations are documented in the referenced advisory at https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md. No official patches or vendor advisories were detailed in available information at the time of publication on 2025-02-20.

Details

CWE(s)

Affected Products

tenda
i12 firmware
1.0.0.10\(3805\)

CVEs Like This One

CVE-2025-25678Same product: Tenda I12
CVE-2026-5609Same product: Tenda I12
CVE-2026-4043Same product: Tenda I12
CVE-2026-5849Same product: Tenda I12
CVE-2025-29149Same product: Tenda I12
CVE-2026-4042Same product: Tenda I12
CVE-2026-4041Same product: Tenda I12
CVE-2026-24110Same vendor: Tenda
CVE-2025-29137Same vendor: Tenda
CVE-2026-24111Same vendor: Tenda

References