CVE-2025-29101
Published: 20 March 2025
Summary
CVE-2025-29101 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Tenda Ac8 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of the syntax, length, and content of the deviceid parameter to directly prevent stack-based buffer overflows in the get_parentControl_list_Info function.
Implements memory protection mechanisms such as stack guards, non-executable stacks, and address space randomization to mitigate exploitation of the stack overflow vulnerability.
Provides denial-of-service protections to limit the impact of remote exploitation causing device crashes or reboots.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated stack buffer overflow in public-facing router web function enables T1190 (Exploit Public-Facing Application) and directly causes DoS via T1499.004 (Application or System Exploitation).
NVD Description
Tenda AC8V4.0 V16.03.34.06 was discovered to contain a stack overflow via the deviceid parameter in the get_parentControl_list_Info function.
Deeper analysisAI
CVE-2025-29101 is a stack-based buffer overflow vulnerability (CWE-121) in the Tenda AC8 V4.0 router running firmware version V16.03.34.06. The flaw occurs in the get_parentControl_list_Info function when processing the deviceid parameter, potentially leading to memory corruption. Published on 2025-03-20, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Remote attackers can exploit this vulnerability over the network without authentication, privileges, or user interaction, using low-complexity techniques. Exploitation results in a denial-of-service condition with high availability impact, such as device crashes or reboots, though no confidentiality or integrity impacts are present.
Details on the vulnerability, including a proof-of-concept, are available in the referenced GitHub repository at https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_get_parentControl_list_Info_overflow.md. No vendor advisories, patches, or specific mitigation guidance are detailed in the provided information.
Details
- CWE(s)