First published: Sat Apr 19 2025(Updated: )
A vulnerability was found in Tenda W12 and i24 3.0.0.4(2887)/3.0.0.5(3644). It has been declared as critical. This vulnerability affects the function cgiPingSet of the file /bin/httpd. The manipulation of the argument pingIP leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda W12 | >=3.0.0.4(2887)<=3.0.0.5(3644) | |
Tenda i24 | >=3.0.0.4(2887)<=3.0.0.5(3644) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3802 has been declared as critical due to its potential for exploitation.
To fix CVE-2025-3802, update your Tenda W12 or i24 devices to the latest firmware version that addresses this vulnerability.
CVE-2025-3802 affects Tenda W12 and Tenda i24 devices running firmware versions 3.0.0.4(2887) to 3.0.0.5(3644).
CVE-2025-3802 is a stack-based buffer overflow vulnerability affecting the cgiPingSet function in the /bin/httpd file.
CVE-2025-3802 can be exploited by manipulating the pingIP argument, potentially leading to unauthorized code execution.