CVE-2025-55606
Published: 22 August 2025
Summary
CVE-2025-55606 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Tenda Ax3 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow vulnerability in the web interface of Tenda AX3 router (public-facing application) enables remote code execution via exploitation.
NVD Description
Tenda AX3 V16.03.12.10_CN is vulnerable to Buffer Overflow in the fromAdvSetMacMtuWan function via the serverName parameter.
Deeper analysisAI
CVE-2025-55606 is a buffer overflow vulnerability (CWE-120) affecting the Tenda AX3 router running firmware version V16.03.12.10_CN. The issue resides in the fromAdvSetMacMtuWan function, which can be triggered via the serverName parameter. It has a CVSS v3.1 base score of 7.5, rated as high severity due to its network accessibility and potential for disruption.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation leads to a denial-of-service condition (high availability impact) by causing the device to crash or reboot, with no impact on confidentiality or integrity.
References for this vulnerability include GitHub documentation at https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_44/44.md, which provides details on the issue. No specific patches or mitigation steps are detailed in the available information.
Details
- CWE(s)