CVE-2025-29358
Published: 13 March 2025
Summary
CVE-2025-29358 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda Rx3 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates the firewallEn parameter in crafted packets to /goform/SetFirewallCfg, preventing the buffer overflow exploitation.
Limits the effects of denial-of-service attacks triggered by the buffer overflow crash on the Tenda RX3 router.
Remediates the specific buffer overflow flaw (CWE-120) in firmware version US_RX3V1.0br_V16.03.13.11_multi_TDE01 through timely patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in unauthenticated public web endpoint (/goform/SetFirewallCfg) directly enables T1190 for remote exploitation of public-facing application; results in system crash/DoS via T1499.004 Application or System Exploitation.
NVD Description
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the firewallEn parameter at /goform/SetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Deeper analysisAI
CVE-2025-29358 is a buffer overflow vulnerability (CWE-120) in the Tenda RX3 router firmware version US_RX3V1.0br_V16.03.13.11_multi_TDE01. The flaw occurs in the handling of the firewallEn parameter via the /goform/SetFirewallCfg endpoint, which can be triggered by a specially crafted packet.
Remote attackers can exploit this vulnerability without authentication or user interaction, as indicated by the CVSS v3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (base score 7.5). Successful exploitation results in a Denial of Service (DoS) condition, potentially crashing the device and disrupting network connectivity.
Advisories reference a technical document at https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_2.pdf (listed twice), which details the vulnerability. No specific patches or mitigation guidance are provided in the available description.
Details
- CWE(s)