CVE-2025-29362
Published: 13 March 2025
Summary
CVE-2025-29362 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda Rx3 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents buffer overflow exploitation by validating the 'list' parameter in crafted packets at the /goform/setPptpUserList endpoint.
SI-2 remediates the specific buffer overflow flaw in Tenda RX3 firmware through timely identification, testing, and patching.
SC-5 protects against and limits the DoS impact from buffer overflow exploitation while identifying attack sources.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in unauthenticated web endpoint (/goform/setPptpUserList) on public-facing router interface enables remote exploitation of public-facing application (T1190) to cause DoS via application/system exploitation (T1499.004).
NVD Description
Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 is vulnerable to Buffer Overflow via the list parameter at /goform/setPptpUserList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Deeper analysisAI
CVE-2025-29362 is a buffer overflow vulnerability (CWE-120) in the Tenda RX3 router, specifically version US_RX3V1.0br_V16.03.13.11_multi_TDE01. The flaw occurs in the handling of the "list" parameter at the /goform/setPptpUserList endpoint, which can be exploited through a crafted packet.
Unauthenticated remote attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation results in a Denial of Service (DoS) condition, disrupting the device's availability. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high-impact potential on affected systems.
Advisory information is provided in documents hosted at https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_3.pdf. No specific details on patches or mitigations are included in the CVE description.
Details
- CWE(s)