Cyber Posture

CVE-2025-28220

High

Published: 28 March 2025

Published
28 March 2025
Modified
06 May 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0268 85.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-28220 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda W6-S Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 14.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of inputs such as the funcpara1 parameter in POST requests to prevent buffer overflows in the setcfm function.

prevent

Implements memory protection mechanisms like stack canaries and non-executable memory to mitigate buffer overflow exploits leading to crashes.

prevent

Mandates timely identification, reporting, and remediation of flaws like this buffer overflow to patch the vulnerable firmware.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Buffer overflow in public-facing web server function allows remote unauthenticated exploitation causing application crash, directly enabling Endpoint Denial of Service via Application or System Exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the setcfm function, which allows remote attackers to cause web server crash via parameter funcpara1 passed to the binary through a POST request.

Deeper analysisAI

CVE-2025-28220 is a buffer overflow vulnerability (CWE-120) affecting the Tenda W6_S router firmware version 1.0.0.4_510, specifically in the setcfm function. Remote attackers can trigger this flaw by sending a POST request to the binary with a specially crafted value in the funcpara1 parameter, leading to a web server crash. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high severity due to the potential for denial-of-service.

Any unauthenticated remote attacker with network access to the device can exploit this vulnerability with low complexity and no user interaction required. Exploitation involves crafting and transmitting the malicious POST request, resulting in the web server's crash and disruption of services, though no confidentiality or integrity impacts are possible.

A technical analysis of the vulnerability is documented in the reference at https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/setcfm.pdf, published on 2025-03-28. No patch or mitigation details are specified in the CVE description.

Details

CWE(s)

Affected Products

tenda
w6-s firmware
1.0.0.4\(510\)

CVEs Like This One

CVE-2025-28221Same product: Tenda W6-S
CVE-2025-1898Same vendor: Tenda
CVE-2025-1899Same vendor: Tenda
CVE-2025-1897Same vendor: Tenda
CVE-2025-29363Same vendor: Tenda
CVE-2025-15255Same product: Tenda W6-S
CVE-2025-29359Same vendor: Tenda
CVE-2025-15254Same product: Tenda W6-S
CVE-2025-29358Same vendor: Tenda
CVE-2025-29360Same vendor: Tenda

References