CVE-2025-25679
Published: 20 February 2025
Summary
CVE-2025-25679 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Tenda I12 Firmware. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 25.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents the stack-based buffer overflow by enforcing validation of the 'index' parameter in the formWifiMacFilterSet function to reject excessive data.
Mitigates exploitation of the stack-based buffer overflow through memory protections such as stack canaries, non-executable stacks, and address space randomization.
Requires identification, reporting, and correction of the specific buffer overflow flaw in Tenda i12 V1.0.0.10(3805) firmware to eliminate the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in router web interface function enables exploitation of remote service for RCE/DoS from adjacent network with low privileges.
NVD Description
Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.
Deeper analysisAI
CVE-2025-25679 is a stack-based buffer overflow vulnerability (CWE-121) in the Tenda i12 router firmware version V1.0.0.10(3805). The flaw occurs in the formWifiMacFilterSet function when processing the index parameter, allowing excessive data to overflow the allocated buffer.
According to its CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), the vulnerability can be exploited by an attacker with adjacent physical network access and low privileges, such as an authenticated user on the local network. Low attack complexity and no user interaction are required, enabling high-impact consequences including unauthorized data access, modification, or system disruption, potentially leading to remote code execution or denial of service.
Technical details on the vulnerability are documented in a GitHub repository at https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md. No vendor advisories or patches are referenced in the CVE publication dated 2025-02-20.
Details
- CWE(s)