Cyber Posture

CVE-2025-55603

HighPublic PoC

Published: 22 August 2025

Published
22 August 2025
Modified
26 September 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0013 32.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55603 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda Ax3 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in Tenda AX3 router's fromSetSysTime function via ntpServer parameter allows unauthenticated remote code execution, enabling exploitation of public-facing applications.

NVD Description

Tenda AX3 V16.03.12.10_CN is vulnerable to Buffer Overflow in the fromSetSysTime function via the ntpServer parameter.

Deeper analysisAI

CVE-2025-55603 is a buffer overflow vulnerability (CWE-120) affecting the Tenda AX3 router on firmware version V16.03.12.10_CN. The flaw exists in the fromSetSysTime function, which mishandles the ntpServer parameter, leading to potential memory corruption. Published on 2025-08-22, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to availability impact.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation triggers a buffer overflow, resulting in a denial-of-service condition that crashes the affected device, disrupting network services without impacting confidentiality or integrity.

Advisories are available at https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_45/45.md, which provides further technical details on the vulnerability. No vendor patches or specific mitigation steps are detailed in the primary CVE information.

Details

CWE(s)

Affected Products

tenda
ax3 firmware
16.03.12.10_cn

CVEs Like This One

CVE-2025-55606Same product: Tenda Ax3
CVE-2025-55605Same product: Tenda Ax3
CVE-2025-69763Same product: Tenda Ax3
CVE-2025-69762Same product: Tenda Ax3
CVE-2025-69765Same product: Tenda Ax3
CVE-2025-69764Same product: Tenda Ax3
CVE-2025-69766Same product: Tenda Ax3
CVE-2025-71024Same product: Tenda Ax3
CVE-2025-71023Same product: Tenda Ax3
CVE-2025-71026Same product: Tenda Ax3

References